cluster-agent-swarm
Fail
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Shell injection patterns detected in multiple observability helper scripts, including
skills/observability/scripts/log-search.sh,skills/observability/scripts/metric-query.sh, andskills/observability/scripts/slo-report.sh. These scripts utilize theevalcommand to construct and executecurlrequests while interpolating script arguments—such as search patterns, PromQL queries, and SLI definitions—directly into the shell execution string without sanitization. - [COMMAND_EXECUTION]: The skill set is designed for high-privilege cluster management and includes operations that execute commands with host-level permissions. For example,
skills/cluster-ops/SKILL.mddocuments node maintenance usingoc debug nodecombined withchroot /host, andskills/security/scripts/cis-benchmark.shexecutes Kubernetes Jobs withhostPID: trueand direct host filesystem mounts. - [EXTERNAL_DOWNLOADS]: Scripts and documentation, such as
skills/artifacts/scripts/generate-sbom.shandskills/qmd.md, provide instructions or references for downloading and installing tools from well-known repositories, includinganchore/syft,aquasecurity/trivy,anchore/grype, andtobi/qmd. These tools are fetched from established GitHub organizations or image registries. - [PROMPT_INJECTION]: Indirect Prompt Injection surface (Category 8) assessment:
- Ingestion points: Container logs (
log-search.sh), cluster events (alert-triage.sh), and Prometheus metrics (metric-query.sh). Data from these sources enters the agent's context and can be influenced by untrusted external actors. - Boundary markers: No specific delimiters or "ignore instructions" warnings are implemented in the scripts when presenting external data to the agent.
- Capability inventory: High. The agent swarm possesses the ability to create, delete, and modify cluster resources, manage secrets, execute cloud-provider CLI commands, and promote container images.
- Sanitization: The scripts do not appear to validate or sanitize the content of logs, events, or metrics before they are retrieved and processed.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/anchore/syft/main/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata