Skip to main content

Integration Patterns

Designs and implements robust integration patterns for APIs, databases, and services, enhancing system connectivity and resilience.

Install this skill

or
0/100

Security score

The Integration Patterns skill was audited on Feb 12, 2026 and we found 49 security issues across 4 threat categories. Review the findings below before installing.

Categories Tested

Security Issues

medium line 107

Template literal with variable interpolation in command context

SourceSKILL.md
107self: `/api/users?page=${result.page}&limit=${result.limit}`,
medium line 109

Template literal with variable interpolation in command context

SourceSKILL.md
109? `/api/users?page=${result.page + 1}&limit=${result.limit}`
medium line 112

Template literal with variable interpolation in command context

SourceSKILL.md
112? `/api/users?page=${result.page - 1}&limit=${result.limit}`
medium line 137

Template literal with variable interpolation in command context

SourceSKILL.md
137self: `/api/users/${user.id}`,
medium line 138

Template literal with variable interpolation in command context

SourceSKILL.md
138posts: `/api/users/${user.id}/posts`,
medium line 139

Template literal with variable interpolation in command context

SourceSKILL.md
139comments: `/api/users/${user.id}/comments`,
medium line 152

Template literal with variable interpolation in command context

SourceSKILL.md
152.location(`/api/users/${user.id}`)
medium line 156

Template literal with variable interpolation in command context

SourceSKILL.md
156self: `/api/users/${user.id}`,
medium line 473

Template literal with variable interpolation in command context

SourceSKILL.md
473pubsub.publish(`COMMENT_ADDED_${input.postId}`, { commentAdded: comment });
medium line 486

Template literal with variable interpolation in command context

SourceSKILL.md
486pubsub.asyncIterator([`COMMENT_ADDED_${postId}`]),
medium line 626

Template literal with variable interpolation in command context

SourceSKILL.md
626params.push(`%${options.search}%`);
medium line 629

Template literal with variable interpolation in command context

SourceSKILL.md
629query += ` ORDER BY ${options.sort} ${options.order}`;
medium line 630

Template literal with variable interpolation in command context

SourceSKILL.md
630query += ` LIMIT $${params.length + 1} OFFSET $${params.length + 2}`;
medium line 777

Template literal with variable interpolation in command context

SourceSKILL.md
777console.error(`Job ${job.id} failed:`, error);
medium line 781

Template literal with variable interpolation in command context

SourceSKILL.md
781console.log(`Job ${job.id} completed`);
medium line 828

Template literal with variable interpolation in command context

SourceSKILL.md
828throw new Error(`Unknown email type: ${type}`);
medium line 888

Template literal with variable interpolation in command context

SourceSKILL.md
888console.log(`Unhandled event type: ${event.type}`);
medium line 934

Template literal with variable interpolation in command context

SourceSKILL.md
934console.log(`Attempt ${attempt} failed, retrying in ${delay}ms...`);
medium line 3

Webhook reference - potential data exfiltration

SourceSKILL.md
3description: Expertise in API design, database integration, and service connectivity. Activates when working with "API", "database", "webhook", "service", "integrate", "connect", or system architectur
medium line 11

Webhook reference - potential data exfiltration

SourceSKILL.md
11Design and implement robust integration patterns for connecting services, databases, and external systems. This skill encompasses RESTful and GraphQL API design, database connection management, event-
medium line 835

Webhook reference - potential data exfiltration

SourceSKILL.md
835**Implement Webhook Processing:**
medium line 837

Webhook reference - potential data exfiltration

SourceSKILL.md
837Handle incoming webhooks with retry logic:
low line 840

Webhook reference - potential data exfiltration

SourceSKILL.md
840// src/webhooks/webhook.handler.ts
low line 844

Webhook reference - potential data exfiltration

SourceSKILL.md
844export class WebhookHandler {
low line 845

Webhook reference - potential data exfiltration

SourceSKILL.md
845async handleStripeWebhook(req: Request, res: Response): Promise<void> {
low line 849

Webhook reference - potential data exfiltration

SourceSKILL.md
849// Verify webhook signature
low line 859

Webhook reference - potential data exfiltration

SourceSKILL.md
859console.error('Webhook error:', error);
low line 860

Webhook reference - potential data exfiltration

SourceSKILL.md
860res.status(400).json({ error: 'Webhook validation failed' });
low line 865

Webhook reference - potential data exfiltration

SourceSKILL.md
865const secret = process.env.STRIPE_WEBHOOK_SECRET!;
medium line 25

Path traversal pattern

SourceSKILL.md
25import { validateRequest } from '../../middleware/validation';
medium line 26

Path traversal pattern

SourceSKILL.md
26import { authenticate } from '../../middleware/auth';
medium line 27

Path traversal pattern

SourceSKILL.md
27import { rateLimit } from '../../middleware/rate-limit';
low line 270

Access to .env file

SourceSKILL.md
270message: process.env.NODE_ENV === 'development' ? err.message : 'An unexpected error occurred',
low line 535

Access to .env file

SourceSKILL.md
535host: config.host || process.env.DB_HOST,
low line 536

Access to .env file

SourceSKILL.md
536port: config.port || Number(process.env.DB_PORT) || 5432,
low line 537

Access to .env file

SourceSKILL.md
537database: config.database || process.env.DB_NAME,
low line 538

Access to .env file

SourceSKILL.md
538user: config.user || process.env.DB_USER,
low line 539

Access to .env file

SourceSKILL.md
539password: config.password || process.env.DB_PASSWORD,
low line 557

Access to .env file

SourceSKILL.md
557host: config.host || process.env.DB_HOST,
low line 558

Access to .env file

SourceSKILL.md
558port: config.port || Number(process.env.DB_PORT) || 3306,
low line 559

Access to .env file

SourceSKILL.md
559database: config.database || process.env.DB_NAME,
low line 560

Access to .env file

SourceSKILL.md
560user: config.user || process.env.DB_USER,
low line 561

Access to .env file

SourceSKILL.md
561password: config.password || process.env.DB_PASSWORD,
low line 749

Access to .env file

SourceSKILL.md
749host: process.env.REDIS_HOST || 'localhost',
low line 750

Access to .env file

SourceSKILL.md
750port: Number(process.env.REDIS_PORT) || 6379,
low line 865

Access to .env file

SourceSKILL.md
865const secret = process.env.STRIPE_WEBHOOK_SECRET!;
low line 969

External URL reference

SourceSKILL.md
969- **REST API Best Practices** - https://restfulapi.net
low line 970

External URL reference

SourceSKILL.md
970- **GraphQL Documentation** - https://graphql.org
low line 971

External URL reference

SourceSKILL.md
971- **Database Design Patterns** - https://www.postgresql.org/docs/
Scanned on Feb 12, 2026
View Security Dashboard
Installation guide →