grafana

Fail

Audited by Snyk on Mar 18, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.80). The prompt includes multiple examples that embed plaintext credentials directly in commands (e.g., curl -u admin:password, curl -s -u admin:<password>, grafana-cli admin reset-admin-password <newpassword>), which encourages producing outputs that contain secret values verbatim and thus creates exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill explicitly instructs downloading community dashboards from the public grafana.com site (see references/common-patterns.md: the curl to "https://grafana.com/api/dashboards/.../download") and then reading/using that JSON to map inputs and import into Grafana, which means untrusted, user-generated third-party content is fetched and interpreted as part of the workflow.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). This skill includes explicit sudo commands and instructions to start/stop systemd services, modify /etc/grafana/grafana.ini, change firewall rules, install plugins under /var/lib, and copy system DB files—actions that modify system state and require root privileges.

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 18, 2026, 01:37 PM
Issues
3