kubernetes-specialist
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- REMOTE_CODE_EXECUTION (CRITICAL): Piped shell execution of remote scripts detected in
references/service-mesh.md. This pattern (curl | sh) allows arbitrary code execution from external sources without prior verification. Evidence:curl -L https://istio.io/downloadIstio | sh -andcurl ... linkerd.io/install | sh. - CREDENTIALS_UNSAFE (HIGH): Reference file
references/configuration.mdcontains hardcoded sensitive patterns in secret templates, including an API key prefix (sk-) and a private key header (-----BEGIN OPENSSH PRIVATE KEY-----). - EXTERNAL_DOWNLOADS (HIGH): The skill instructs the user to download and apply Kubernetes manifests from non-whitelisted external URLs in
references/service-mesh.md(e.g.,istio.ioandraw.githubusercontent.com/istio/...). - COMMAND_EXECUTION (MEDIUM): Multiple reference files provide templates for Kubernetes Jobs and CronJobs that execute shell commands (
/bin/sh -c) within containers, which increases the attack surface if inputs are not properly sanitized.
Recommendations
- AI detected serious security threats
Audit Metadata