k8s
Pass
Audited by Gen Agent Trust Hub on Feb 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of the
kubectlandfluxcommand-line interfaces to manage system resources and cluster state. It also utilizeswgetandcurlto interact with internal service APIs. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) because it processes untrusted data from the cluster environment.
- Ingestion points: Untrusted data enters the context through
kubectl logs,kubectl get events, andflux getcommands as described inSKILL.md. - Boundary markers: No explicit delimiters or instructions are provided to the agent to ignore embedded commands within the fetched data.
- Capability inventory: The skill has access to shell execution, cluster authentication secrets, and internal network tools (
curl,wget). - Sanitization: No validation or sanitization is performed on the output of cluster commands before processing.
- [DATA_EXFILTRATION]: The skill accesses sensitive cluster credentials stored in the local file system at
~/.kube/dev.yaml,~/.kube/integration.yaml, and~/.kube/live.yamlto establish connectivity. - [SAFE]: The skill provides references to well-known technology documentation sites, such as
grafana.github.ioandprometheus-io, for researching service configurations.
Audit Metadata