telnyx-video-java

Fail

Audited by Snyk on May 13, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt contains a literal refresh_token/JWT embedded in an example and shows it being passed verbatim into the API call, which requires the model to output or handle a secret string directly.

HIGH W008: Secret detected in skill content (API keys, tokens, passwords).

  • Secret detected (high risk: 1.00). The documentation contains a full, non-truncated JWT used directly as the refreshToken argument in a code sample. It is a high-entropy, literal credential (header.payload.signature format, not a placeholder like "YOUR_API_KEY" or "sk-xxxx"). Even if it may have expired, it is a real-looking token tied to Telnyx claims and should be treated as a secret and removed/rotated.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W008
HIGH

Secret detected in skill content (API keys, tokens, passwords).

Audit Metadata
Risk Level
HIGH
Analyzed
May 13, 2026, 04:20 PM
Issues
2