kubernetes-operations
Pass
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: References the official Helm installation script from the Helm GitHub repository (https://raw.githubusercontent.com/helm/helm/main/scripts/get-helm-3). This is a reference to a well-known and recognized service.\n- [REMOTE_CODE_EXECUTION]: Includes patterns for downloading and executing remote scripts via shell piping for the purpose of tool installation from recognized sources.\n- [CREDENTIALS_UNSAFE]: Provides instructions for retrieving and decoding Kubernetes Secrets using the command
kubectl get secret -o jsonpath='{.data.password}' | base64 -d, enabling the agent to access sensitive credentials.\n- [COMMAND_EXECUTION]: Instructs the agent on utilizing powerful commands such askubectl execfor interactive container access,kubectl runfor creating ephemeral resources, andhelm installfor deploying software, all of which require significant privileges.\n- [PROMPT_INJECTION]: Vulnerable to indirect prompt injection because the skill processes data from the cluster that could be controlled by an external actor.\n - Ingestion points: Cluster logs and resource definitions retrieved via
kubectl logs,kubectl get, andkubectl describe(referenced in SKILL.md and REFERENCE.md).\n - Boundary markers: No specific delimiters or warnings are used to differentiate cluster data from instructions.\n
- Capability inventory: Access to
Bash(kubectl, helm, kustomize),WebFetch, and file system write operations.\n - Sanitization: The skill does not describe any validation or sanitization steps for data retrieved from the cluster before it is processed by the agent context.
Audit Metadata