If you discover a security vulnerability in this project, please report it responsibly.
Do not open a public GitHub issue for security vulnerabilities.
Instead, please email security@snowflake.com with:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if any)
We will acknowledge receipt within 48 hours and provide a timeline for a fix.
This repository contains markdown skills, shell scripts, and builder apps (FastAPI + React). Security concerns include:
- Credential leakage — skills, templates, and app code must never contain real tokens, keys, or passwords
- Supply chain — the install script downloads files from this GitHub repo; verify you're using the official
Snowflake-Labs/snowflake-ai-kitsource - Code injection — skills instruct AI agents to generate code; skill authors should avoid patterns that could lead to SQL injection, command injection, or XSS in generated code
- API security — builder apps communicate with Snowflake APIs using PAT/password auth; credentials must only come from environment variables or Snowflake's built-in auth mechanisms
- Never commit credentials, tokens, API keys, or
.envfiles - Use synthetic/example data in all templates and references
- Review generated code patterns for OWASP Top 10 vulnerabilities
- Use environment variables for any sensitive configuration in examples