k8s-security-hardening
Warn
Audited by Snyk on Feb 28, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's SKILL.md explicitly instructs applying a public GitHub manifest (e.g., "kubectl apply -f https://raw.githubusercontent.com/aquasecurity/kube-bench/main/job.yaml"), which means it fetches and acts on untrusted third-party content that can influence runtime actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.80). The skill contains runtime commands that fetch and apply a remote manifest (kubectl apply -f https://raw.githubusercontent.com/aquasecurity/kube-bench/main/job.yaml), which executes external configuration/code in-cluster.
Audit Metadata