xparse-parse

Fail

Audited by Snyk on Apr 10, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes examples that embed secrets verbatim in commands (e.g., --password <PWD>) and refers to configuring paid API credentials, which could require the LLM to accept or emit secret values directly, creating an exfiltration risk.

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.90). These are direct links to shell and PowerShell installer scripts hosted on a non-obvious third‑party download subdomain and the skill instructs piping them directly into a shell/iex — a high‑risk pattern for remote code execution and malware distribution unless the domain and package are explicitly verified.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill's workflow (SKILL.md "Prefer this skill whenever the task starts from a local file or document URL" and the Default Path / Quick start steps: "Run xparse-cli parse <FILE>" then "Read the markdown result") requires ingesting and interpreting arbitrary user-provided or public document content (including document URLs), which could contain untrusted, instruction-like text that influences subsequent agent decisions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Issues (4)

W007
HIGH

Insecure credential handling detected in skill instructions.

E005
CRITICAL

Suspicious download URL detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 10, 2026, 02:33 PM
Issues
4