First Seen
Feb 19, 2026
Last Scanned
Feb 22, 2026
Findings
4
Score
85/100
Findings (4)
Detects skills that both read sensitive credential files and send data to external services
Access your private key + POST to endpoint Block access to git credentials, SSH keys, and repository tokens. If git operations are needed, use scoped deploy keys and restrict the tool to specific repositories.
Likely FP if the match is documentation about git configuration (e.g., setting up git credentials helper) rather than code that reads and transmits them.
Detects URLs fetched at runtime that control or influence agent behavior without pinning
GET https:// + prompt Avoid loading configuration or behavior-controlling content from runtime URLs. Bundle required configurations locally or pin remote config to versioned, integrity-verified endpoints.
Likely FP if the URL in the match is a documentation link or example URL (e.g., example.com) rather than an actual runtime-fetched configuration endpoint.
Detects MCP server configurations connecting to non-localhost remote URLs
"url": "https://x402.quickintel.io/v1/tator/prompt" Change the MCP server URL to localhost or a trusted internal endpoint. If a remote server is required, verify the domain ownership and use HTTPS with certificate validation.
Likely FP if the URL points to example.com, a documentation domain, or a well-known SaaS API endpoint (e.g., api.openai.com).
Detects references to raw.githubusercontent.com on mutable branches like main/master
github.com/coinbase/x402/blob/main/specs/schemes/exact/scheme_exact_evm.md Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.
Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.