Medusa headless commerce - modules, workflows, API routes, admin UI
48
37%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Risky
Do not use without reviewing
Optimize this skill with Tessl
npx tessl skill review --optimize ./skills/medusa/SKILL.mdSecurity
2 findings — 1 high severity, 1 medium severity. You should review these findings carefully before considering using this skill.
The skill handles credentials insecurely by requiring the agent to include secret values verbatim in its generated output. This exposes credentials in the agent’s context and conversation history, creating a risk of data exfiltration.
Insecure credential handling detected (high risk: 1.00). The prompt includes explicit plaintext secrets and commands that pass passwords on the command line (e.g., `npx medusa user -e admin@example.com -p supersecret`, `password123`, JWT_SECRET placeholders), which requires or encourages emitting secret values verbatim in output and is an insecure pattern.
The skill is specifically designed for direct financial operations, giving the agent the ability to move money or execute financial transactions — such as payment processing, cryptocurrency operations, banking integrations, or market order execution.
Direct money access detected (high risk: 1.00). The skill explicitly includes payment gateway integration: a "Payment Integration" section shows installing @medusajs/payment-stripe, configuring it in medusa-config with STRIPE_API_KEY, and admin instructions to add Stripe as a payment provider. The Store API also includes endpoints to complete carts/create orders (POST /store/carts/{cart.id}/complete), which together indicate the skill is designed to process payments via Stripe. This is a specific financial execution capability (payment gateway).
d4ddb03
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.