vastai-incident-runbook
Fail
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE]: The runbook includes a command to extract and decode a Kubernetes secret (
vastai-secrets). The commandkubectl get secret vastai-secrets -o jsonpath='{.data.api-key}' | base64 -ddirectly exposes sensitive API keys in plaintext within the agent's execution environment. - [COMMAND_EXECUTION]: The skill requires and utilizes high-privilege access to a production Kubernetes cluster via
kubectl. It performs sensitive operations including secret creation (kubectl create secret), environment variable modification (kubectl set env), and deployment restarts (kubectl rollout restart). - [COMMAND_EXECUTION]: The skill attempts to execute a script located at
./scripts/vastai-debug-bundle.sh. Since this script is not part of the provided skill files, its logic is unverifiable and presents a risk of executing unintended or malicious code present on the host system. - [COMMAND_EXECUTION]: The skill is susceptible to Indirect Prompt Injection. Evidence: (1) Ingestion points:
kubectl logsandcurl https://api.yourapp.com/health. (2) Boundary markers: None present. (3) Capability inventory: Fullkubectlaccess andbashexecution. (4) Sanitization: No escaping or validation is performed on log or endpoint data before processing.
Recommendations
- AI detected serious security threats
Audit Metadata