bolta-skills-index

clawhub:bolta-skills-index

View source
F
2/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

12

Score

2/100

HIGH 6
MEDIUM 1
LOW 5

Findings (12)

HIGH
Stripe API key
L236

Detects Stripe live and test API keys

sk_live_00000000000000000000000000000000
FIX

Remove the Stripe API key and replace it with a reference to an environment variable. Immediately roll the key in the Stripe dashboard if it was a live key (sk_live_).

FP?

Likely FP if the key uses the test prefix (sk_test_) in a documentation context, or is a clearly truncated example string.

HIGH
Runtime URL controls agent behavior
L432

Detects skills fetching external URLs to use as runtime instructions

curl -L https://raw.githubusercontent.com + configuration
FIX

Pin the downloaded resource to a specific version or commit hash, and verify its integrity with a checksum (SHA-256). Avoid fetching scripts or binaries from arbitrary URLs at runtime.

FP?

Likely FP if the download URL points to a well-known CDN or package registry (e.g., npmjs.com, pypi.org) and is pinned to a specific version.

HIGH
Capability escalation
L969

Detects excessive or dangerous capability requests in MCP configurations

Permissions:** `workspace:admin
FIX

Restrict the tool to well-defined scopes and prevent it from requesting all permissions. Implement least-privilege access controls and audit permission grants.

FP?

Likely FP if the match is a tool description documenting available permission scopes, not a tool that actually requests overly broad access.

HIGH
Capability escalation
L979

Detects excessive or dangerous capability requests in MCP configurations

Permissions:** `workspace:admin
FIX

Restrict the tool to well-defined scopes and prevent it from requesting all permissions. Implement least-privilege access controls and audit permission grants.

FP?

Likely FP if the match is a tool description documenting available permission scopes, not a tool that actually requests overly broad access.

HIGH
Capability escalation
L1000

Detects excessive or dangerous capability requests in MCP configurations

Permissions:** `workspace:admin
FIX

Restrict the tool to well-defined scopes and prevent it from requesting all permissions. Implement least-privilege access controls and audit permission grants.

FP?

Likely FP if the match is a tool description documenting available permission scopes, not a tool that actually requests overly broad access.

HIGH
Capability escalation
L1020

Detects excessive or dangerous capability requests in MCP configurations

Permissions:** `workspace:admin
FIX

Restrict the tool to well-defined scopes and prevent it from requesting all permissions. Implement least-privilege access controls and audit permission grants.

FP?

Likely FP if the match is a tool description documenting available permission scopes, not a tool that actually requests overly broad access.

MEDIUM
Download binary or archive from URL
L374

Detects downloading binary, archive, or installer files from remote URLs

curl -L https://github.com/boltaai/bolta-skills/archive/refs/heads/main.zip
FIX

Verify the integrity of downloaded binaries or archives using SHA-256 checksums or GPG signatures. Pin download URLs to specific versions and avoid fetching from unverified sources.

FP?

Likely FP if the download is from github.com or githubusercontent.com for a specific tagged release with documented checksums.

LOW
npx MCP server without version pin
L268

Detects MCP server configs using npx to run packages without version pinning

"command": "npx"
FIX

Pin the npx package in the MCP config to an exact version (e.g., @scope/server@1.2.3). Unpinned npx commands can silently fetch a compromised package version.

FP?

Likely FP if the MCP config is a local development setup example, though unpinned npx in production configs is a real supply chain risk.

LOW
Auto-confirm flag bypassing user verification
L269

Detects -y, --yes, or --auto-approve flags in MCP/skill install commands that bypass user confirmation

"-y"
FIX

Remove the -y/--yes auto-confirm flag from MCP server launch arguments. This flag bypasses user confirmation prompts and allows unattended execution of potentially dangerous operations.

FP?

Likely FP if the matched text is an isolated flag (-y or --yes) in documentation describing command-line options, not in an actual MCP config.

LOW
Hardcoded secrets in MCP env block
L270

Detects hardcoded API keys, tokens, or passwords in MCP server environment configuration

"env": { + "BOLTA_API_KEY": "sk_live_your_actual_key_here"
FIX

Remove shell metacharacters (semicolons, pipes, ampersands, backticks) from MCP server arguments. Use explicit argument arrays and avoid shell expansion in MCP configurations.

FP?

Likely FP if the metacharacter is a literal part of a non-shell argument (e.g., a regex pattern or a URL query parameter containing ampersands).

LOW
Mutable GitHub raw content reference
L432

Detects references to raw.githubusercontent.com on mutable branches like main/master

raw.githubusercontent.com/boltaai/bolta-skills/main/
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.

LOW
Mutable GitHub raw content reference
L436

Detects references to raw.githubusercontent.com on mutable branches like main/master

raw.githubusercontent.com/boltaai/bolta-skills/main/
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.