aws-s3-eks
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill contains several shell scripts (
scripts/create-s3-bucket.shandscripts/setup-pod-identity.sh) that execute system-level commands usingaws,kubectl, andeksctlbased on user-provided arguments. - Evidence: The scripts use
set -euo pipefailand include a--dry-runmode, which are good practices, but they still represent a significant command execution surface for AWS infrastructure and Kubernetes clusters. - [DATA_EXFILTRATION]: The script
scripts/create-s3-bucket.shincludes an option (--public-read) that explicitly applies a public-read policy to the created S3 bucket, potentially exposing data to the public internet if misconfigured. - Evidence: Line 158 in
scripts/create-s3-bucket.shapplies a policy allowings3:GetObjecttoPrincipal: "*"when the--public-readflag is used. - [SAFE]: The skill promotes the use of EKS Pod Identity, which is a secure alternative to static IAM credentials or IRSA (IAM Roles for Service Accounts) with OIDC providers.
- Evidence: The documentation in
SKILL.mdandreferences/openapi.yamlcorrectly explains howAWS_CONTAINER_CREDENTIALS_FULL_URIis used by the AWS SDK to retrieve temporary credentials, reducing the risk of hardcoded secret exposure.
Audit Metadata