skills/jeremylongshore/claude-code-plugins-plus-skills/clay-advanced-troubleshooting/Gen Agent Trust Hub
clay-advanced-troubleshooting
Fail
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The
advanced-clay-debug.shscript executeskubectl get secret clay-secrets -o yaml. This command retrieves Kubernetes secrets in a Base64-encoded (unredacted) format. Despite the output filename including "redacted", no actual filtering or redaction of sensitive data is performed. - [COMMAND_EXECUTION]: The skill requires the ability to execute powerful system commands including
kubectl,curl, andtcpdumpto gather logs, metrics, and network captures. - [DATA_EXFILTRATION]: The skill facilitates the collection of sensitive system information, including unredacted secrets and network traffic, into a single compressed archive (
.tar.gz) for external review. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through the processing of untrusted logs.
- Ingestion points: Pod logs and system journals are retrieved from the environment using
kubectl logsandjournalctlas seen inSKILL.md. - Boundary markers: No delimiters or instructions to ignore instructions within the logs are implemented.
- Capability inventory: The skill possesses the capability to run system commands via
kubectl,curl, andtcpdump. - Sanitization: No sanitization or validation is applied to the retrieved log data before it is handled by the agent.
Recommendations
- AI detected serious security threats
Audit Metadata