openshift
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): The skill contains hardcoded example credentials in documentation code blocks which may lead to insecure configuration if used literally. Evidence: 'oc login ... -p password', 'oc create secret ... --from-literal=password=secret123', '--docker-password=pass' in SKILL.md.
- [REMOTE_CODE_EXECUTION] (HIGH): The skill facilitates Source-to-Image (S2I) deployments which download and build code from remote repositories without integrity verification. Evidence: 'oc new-app https://github.com/org/myapp.git' in SKILL.md.
- [COMMAND_EXECUTION] (HIGH): Provides administrative commands for cluster manipulation and privilege escalation through Security Context Constraints. Evidence: 'oc adm policy add-scc-to-user anyuid', 'oc debug pod/myapp-1-xyz' in SKILL.md.
- [Indirect Prompt Injection] (HIGH): The skill has a high attack surface for indirect prompt injection by processing untrusted data like logs and external source code while having administrative write/execute capabilities. Ingestion points: 'oc logs', 'oc new-app', 'oc get events'. Boundary markers: None. Capability inventory: 'oc' cluster management. Sanitization: None.
Recommendations
- AI detected serious security threats
Audit Metadata