k8s-security-redteam
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill includes commands for high-privilege host interaction, including container escapes using
nsenterandchroot, as well as mounting host filesystems (mount /dev/sda1 /host). It also utilizeskubectlfor administrative cluster operations.\n- [DATA_EXFILTRATION]: The skill provides instructions for the discovery and extraction of sensitive credentials, including cluster-wide Kubernetes secrets, service account tokens, and cloud identity tokens from AWS, GCP, and Azure Instance Metadata Services (IMDS).\n- [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection. 1. Ingestion points: Untrusted cluster data is ingested viakubectl get pods -A -o jsonin SKILL.md and attack-matrix.md. 2. Boundary markers: No delimiters or 'ignore embedded instructions' warnings are present. 3. Capability inventory: The agent has access to administrativekubectlcommands,curl, and host-level execution tools likensenter. 4. Sanitization: No evidence of escaping or validation of cluster resource content is provided before processing.\n- [EXTERNAL_DOWNLOADS]: The skill downloads and installs the security tools 'kubescape' and 'trivy' from the official Homebrew package registry.
Audit Metadata