skills/jeremylongshore/claude-code-plugins-plus-skills/vercel-advanced-troubleshooting/Gen Agent Trust Hub
vercel-advanced-troubleshooting
Fail
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The evidence collection framework in
references/evidence-collection-framework.mdexecutes the commandkubectl get secret vercel-secrets -o yaml. This retrieves the full, unredacted content of Kubernetes secrets, including sensitive keys and credentials, and stores them in a local file within the debug bundle. - [DATA_EXFILTRATION]: The skill's primary workflow involves creating a 'Comprehensive Debug Bundle' that aggregates production logs, system journals, and secret configurations. The instructions in
SKILL.mdthen encourage the user to 'Escalate with Evidence' by submitting this sensitive bundle to an external support portal. - [COMMAND_EXECUTION]: The
allowed-toolsmetadata inSKILL.mdgrants broad permissions for thekubectlandtcpdumpbinaries using wildcards. This allows the agent to execute any subcommands or flags, including those that perform privileged network traffic interception or administrative cluster operations. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. (1) Ingestion points: Production logs (
kubectl logs) and system journals (journalctl) are read inreferences/evidence-collection-framework.md. (2) Boundary markers: None are present to distinguish between log data and instructions. (3) Capability inventory: The skill has access to powerful tools likeBash,kubectl, andcurl. (4) Sanitization: No sanitization or filtering is applied to the ingested log content before it is processed by the agent.
Recommendations
- AI detected serious security threats
Audit Metadata