CtrlK
BlogDocsLog inGet started
Tessl Logo

flow-nexus-platform

Comprehensive Flow Nexus platform management - authentication, sandboxes, app deployment, payments, and challenges

68

5.55x
Quality

52%

Does it follow best practices?

Impact

100%

5.55x

Average score across 3 eval scenarios

SecuritybySnyk

Risky

Do not use without reviewing

Optimize this skill with Tessl

npx tessl skill review --optimize ./.claude/skills/flow-nexus-platform/SKILL.md
SKILL.md
Quality
Evals
Security

Security

3 findings — 1 high severity, 2 medium severity. You should review these findings carefully before considering using this skill.

High

W007: Insecure credential handling detected in skill instructions

What this means

The skill handles credentials insecurely by requiring the agent to include secret values verbatim in its generated output. This exposes credentials in the agent’s context and conversation history, creating a risk of data exfiltration.

Why it was flagged

Insecure credential handling detected (high risk: 1.00). The skill includes numerous examples and API calls that require embedding secrets verbatim into RPC/command payloads and env_vars (e.g., passwords, API_KEY, anthropic_key: "sk-ant-...", DATABASE_URL), which forces the LLM to handle and output secret values directly and creates exfiltration risk.

Report incorrect finding
Medium

W011: Third-party content exposure detected (indirect prompt injection risk)

What this means

The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.

Why it was flagged

Third-party content exposure detected (high risk: 0.90). The skill explicitly allows running arbitrary code and startup scripts that fetch public URLs (e.g., the sandbox_execute example calling fetch('https://api.example.com/data') and the Advanced Sandbox Configuration startup_script that does git clone https://github.com/user/repo), and also surfaces community app/templates from the app store, meaning untrusted, user-generated web content can be ingested and influence runtime behavior.

Medium

W009: Direct money access capability detected (payment gateways, crypto, banking)

What this means

The skill is specifically designed for direct financial operations, giving the agent the ability to move money or execute financial transactions — such as payment processing, cryptocurrency operations, banking integrations, or market order execution.

Why it was flagged

Direct money access detected (high risk: 1.00). The skill includes explicit payment APIs and credit-management functions. Examples: mcp__flow-nexus__create_payment_link explicitly returns a Stripe payment URL (Payment Gateway integration), mcp__flow-nexus__configure_auto_refill can automatically purchase credits, there are endpoints to check balances, get payment history, withdraw/use credits, and mcp__flow-nexus__app_store_earn_ruv can programmatically credit user accounts. These are specific financial operations (payment gateway usage and account/credit transactions), not generic tools, so the skill grants direct financial execution capability.

Repository
ruvnet/ruvector
Audited
Security analysis
Snyk

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.