secrets-management

Fail

Audited by Snyk on Apr 28, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.80). The prompt contains examples that hardcode and echo secrets (e.g., export VAULT_TOKEN='root', vault kv put ... password=secret, aws --secret-string "super-secret-password", and echo "API Key: ${{ secrets.API_KEY }}"), which encourages emitting secret values verbatim in scripts/logs and thus risks exfiltration.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.80). The skill contains runtime execution of externally fetched code — e.g., the pre-commit hook pulls and runs the Docker image trufflesecurity/trufflehog:latest, and the CI examples reference external GitHub Actions (hashicorp/vault-action@v2, actions/checkout@v4, aws-actions/configure-aws-credentials@v4) which are fetched and executed during workflow runs — so these are runtime external dependencies that execute remote code.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W012
MEDIUM

Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
HIGH
Analyzed
Apr 28, 2026, 10:10 AM
Issues
2