skills/jeremylongshore/claude-code-plugins-plus-skills/firecrawl-incident-runbook/Gen Agent Trust Hub
firecrawl-incident-runbook
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill executes high-privilege
kubectlcommands to manage a production environment. - Evidence: Includes
kubectl rollout restart deployment/firecrawl-integrationandkubectl applyto modify cluster state during remediation. - Evidence: Executes a local script
./scripts/firecrawl-debug-bundle.shfor evidence collection. - [CREDENTIALS_UNSAFE]: The runbook contains instructions that explicitly retrieve and decode sensitive production credentials.
- Evidence: The command
kubectl get secret firecrawl-secrets -o jsonpath='{.data.api-key}' | base64 -doutputs plain-text API keys into the agent's context. - [EXTERNAL_DOWNLOADS]: The skill interacts with external domains to check service health and status.
- Evidence: Performs health checks via
curltohttps://status.firecrawl.comandhttps://api.firecrawl.com. These are recognized as well-known services related to the skill's purpose. - [INDIRECT_PROMPT_INJECTION]: The skill processes potentially untrusted external data which could influence agent behavior.
- Ingestion points: Reads cluster logs via
kubectl logsand external status pages viacurl. - Boundary markers: None present in the instructions to separate data from commands.
- Capability inventory: High-privilege
kubectlaccess, environment variable modification, and script execution. - Sanitization: None detected; logs and external responses are piped directly to tools like
grepandjq.
Audit Metadata