typo3-ddev

Fail

Audited by Snyk on May 7, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt embeds an explicit username/password ("admin / Joh316!!") as operational credentials for accessing the TYPO3 backend, so an agent using this skill would likely need to output or embed that secret verbatim in instructions or commands.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). I scanned the full prompt for literal credentials. The only direct credential-like entry is the line "Credentials: admin / Joh316!!". This is a specific username and password pair (not a placeholder like YOUR_API_KEY or sk-xxxx, and not a simple setup password). The password contains mixed-case letters, digits and punctuation and is presented as an actual admin credential, so it appears to be a usable secret and should be flagged.

No API keys, private keys, tokens, or other high-entropy secrets were found. Other values (ports, php_version, command examples, file paths, etc.) are configuration or documentation items and were ignored per the rules.

Issues (3)

W007
HIGH

Insecure credential handling detected in skill instructions.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

W008
HIGH

Secret detected in skill content (API keys, tokens, passwords).

Audit Metadata
Risk Level
HIGH
Analyzed
May 7, 2026, 08:35 PM
Issues
3