k8s-debug
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/pod_diagnostics.pyusessubprocess.runwithshell=Trueto executekubectlcommands. It interpolates thepod_nameandnamespacevariables directly into the command string without validation. If an attacker can influence the pod name (e.g., by creating a pod with a name containing shell metacharacters like semicolons), they could execute arbitrary commands on the system running the skill. \n - Ingestion points:
pod_nameandnamespacearguments inscripts/pod_diagnostics.pyandscripts/network_debug.sh.\n - Boundary markers: None.\n
- Capability inventory:
subprocess.run(Python),kubectl exec(Shell),kubectl logs.\n - Sanitization: Absent; inputs are interpolated directly into shell commands.\n- [EXTERNAL_DOWNLOADS]: The skill documentation and scripts suggest using the
nicolaka/netshootDocker image for network troubleshooting. This is an established community tool commonly used for Kubernetes diagnostics.\n- [COMMAND_EXECUTION]: The toolkit provides the agent with extensive access to cluster diagnostics viakubectl, including logs and configuration metadata. While essential for debugging, this provides the agent with access to sensitive application data and cluster state, requiring the execution environment to follow the principle of least privilege.
Audit Metadata