deco-site-deployment
Warn
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes multiple CLI tools including
kubectl,curl,jq, andbase64. It dynamically constructs shell commands using variables likeSITENAMEandTARGET_CLUSTER_CONTEXT, which presents a command injection surface if these variables are influenced by untrusted input. - [REMOTE_CODE_EXECUTION]: The
SiteStateschema processed by the skill includes fields forrunnerImage,builderImage, andrunArgs. Modifying these fields allows for the execution of arbitrary containers and the manipulation of application runtime behavior within the target production Kubernetes clusters. - [EXTERNAL_DOWNLOADS]: The skill uses
curlto send authenticated POST requests toadmin.deco.cxandadmin-gcp.deco.cx. These requests transmit site configuration data to external administrative endpoints to trigger redeployments. - [COMMAND_EXECUTION]: The skill performs high-privilege Kubernetes operations, including switching cluster contexts (
kubectl config use-context) and patching sensitivestatesecrets. These actions require significant cluster permissions and could lead to unauthorized configuration changes if exploited.
Audit Metadata