security-hardening
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The script
scripts/scan-infrastructure.shdownloads and executes a Kubernetes manifest directly fromraw.githubusercontent.com/aquasecurity/kube-bench/main/job.yaml. As theaquasecurityorganization is not in the trusted list, this constitutes an unverifiable remote code execution risk. - [COMMAND_EXECUTION] (HIGH): The script
scripts/scan-infrastructure.shperforms privilege escalation usingsudoto runlynis. It also executesdocker-bench-securitywith high-privilege flags (--net host,--pid host,--cap-add audit_control), which allows the container to bypass host isolation. - [EXTERNAL_DOWNLOADS] (HIGH): The skill fetches resources from an external GitHub account (
aquasecurity) not included in the predefined trusted scope.
Recommendations
- AI detected serious security threats
Audit Metadata