RobustaDev
Audited by Socket on Feb 15, 2026
1 alert found:
SecurityThis Skill/README fragment appears to be legitimate documentation for Robusta (Kubernetes alert automation). I found no signs of code obfuscation, embedded payloads, or explicit malicious behavior. The primary security concerns are operational: destructive actions (delete_pod, node_bash_enricher) require strong RBAC controls and careful configuration; plaintext storage of sink credentials in generated_values.yaml increases risk of credential leakage if files are checked into repos; and optional SaaS/AI features (platform.robusta.dev, HolmesGPT) could exfiltrate alert/context data if a user selects hosted services rather than self-hosting. Recommend enforcing least-privilege RBAC for Robusta components, keeping generated_values.yaml out of source control or using sealed/secret management, and documenting explicit safe defaults and approvals for destructive actions.