auto-lambda-env
Facilitates setting environment variables for AWS Lambda functions in AI automation, ensuring secure and efficient configuration management.
Install this skill
Security score
The auto-lambda-env skill was audited on Apr 6, 2026 and we found 10 security issues across 1 threat category. Review the findings below before installing.
Categories Tested
Security Issues
Webhook reference - potential data exfiltration
| 7 | You set Lambda environment variables for the AI automation agents. There are 2 consolidated router Lambda functions: **WI Router** (work-item webhook events) and **PR Router** (pull-request webhook ev |
Webhook reference - potential data exfiltration
| 40 | > **Webhook basic auth username?** (Lambda env var `BASIC_USER`) Example: `automation-webhook`. Must match what you'll set in ADO Service Hooks. |
Webhook reference - potential data exfiltration
| 42 | > **Webhook basic auth password?** (secret — Lambda env var `BASIC_PASS`) Suggest generating: `openssl rand -base64 24` |
Webhook reference - potential data exfiltration
| 44 | > **Webhook secret?** (secret — Lambda env var `WEBHOOK_SECRET`) Suggest generating: `openssl rand -base64 32` |
Webhook reference - potential data exfiltration
| 62 | The WI Router (`<PREFIX>-WI-Router`) handles all work-item webhook events and routes to the appropriate pipeline (DoR, DoD, BugFix, QA, DevAgent, DOCAgent, Estimation) based on tag gates. |
Webhook reference - potential data exfiltration
| 73 | WEBHOOK_SECRET=<secret>, |
Webhook reference - potential data exfiltration
| 97 | The PR Router (`<PREFIX>-PR-Router`) handles all pull-request webhook events. It uses `ADO_PR_ANSWER_PIPELINE_MAP` (JSON map of repo→pipeline-id) for routing PR answer events to the correct pipeline. |
Webhook reference - potential data exfiltration
| 107 | WEBHOOK_SECRET=<secret>, |
Webhook reference - potential data exfiltration
| 147 | | WEBHOOK_SECRET | ✓ | ✓ | |
Webhook reference - potential data exfiltration
| 172 | `/auto-webhooks` — Configure ADO service hooks |