debugging-techniques
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (HIGH): The 'Node Debugging' section in 'references/container-debugging.md' describes using 'kubectl debug node' and 'chroot /host' to gain root access to the underlying Kubernetes host, bypassing container isolation.
- EXTERNAL_DOWNLOADS (LOW): The skill references external container images like 'nicolaka/netshoot', 'ubuntu', and 'alpine' for use in ephemeral debugging sessions.
- COMMAND_EXECUTION (INFO): Automated scanner alerts for 'main.rs' and 'logger.info' are determined to be false positives; these are standard file and code identifiers misidentified as malicious domains.
Recommendations
- AI detected serious security threats
- Contains 2 malicious URL(s) - DO NOT USE
Audit Metadata