k8s-security-redteam

Fail

Audited by Snyk on Feb 28, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill explicitly instructs reading secrets (e.g., service account tokens) and embedding them verbatim in commands/headers (TOKEN=$(cat ...) then curl -H "Authorization: Bearer $TOKEN"), which requires handling secret values directly.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This content provides explicit, actionable instructions for credential theft (service account and cloud metadata tokens), privilege escalation (rolebinding creation, RBAC abuse), container escape and host compromise (mounting host filesystem, nsenter), and backdoor/persistence techniques (implant containers, creating service accounts) that are high-risk if used without authorization.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs destructive and state-changing actions (e.g., creating cluster-admin RoleBindings, mounting host filesystems, chroot/nsenter host escape, and modifying cluster/ConfigMap resources) that require elevated privileges and would compromise the machine or cluster state.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 28, 2026, 08:58 AM