analyze-gitops-repo
Fail
Audited by Gen Agent Trust Hub on Feb 22, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): Hardcoded sensitive credentials were detected in
evals/files/bad-structure/redis.yaml. Specifically, the Helm values containauth.password: supersecret123. While part of an evaluation file, hardcoding plaintext secrets is a major security risk. - [EXTERNAL_DOWNLOADS] (HIGH): The script
scripts/validate.shdownloads resources from organizations (controlplaneio-fluxcd,fluxcd) that are not on the Trusted Organizations list. The script usescurl | tarto download and extractcrd-schemas.tar.gzinto/tmp, which is a high-risk pattern that could lead to arbitrary file write or execution if the remote source is compromised. - [COMMAND_EXECUTION] (MEDIUM): The skill's operational scripts (
scripts/validate.shandscripts/check-deprecated.sh) execute shell commands and specialized CLIs (flux, kustomize, kubeconform) on data fetched from external, untrusted Git repositories. This presents a risk of local command execution if the input manifests are maliciously crafted to exploit the analysis tools. - [PROMPT_INJECTION] (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8).
- Ingestion points: As seen in
evals/evals.json, the agent is instructed to clone external repositories (e.g.,github.com/fluxcd/flux2-kustomize-helm-example.git) for analysis. - Boundary markers: No explicit delimiters or instructions to ignore embedded commands are provided to the agent.
- Capability inventory: The skill executes several powerful tools including
kustomize buildandflux migrate, which parse and process the ingested content. - Sanitization: No sanitization or safety checks are performed on the repository contents prior to processing.
Recommendations
- AI detected serious security threats
Audit Metadata