skaffold-standards
Fail
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill includes instructions to install the
dotenvxutility using a high-risk pattern: fetching a script from an external URL (https://dotenvx.sh) and piping it directly into the shell (sh). This allows for the execution of arbitrary remote code on the host system. - [DATA_EXPOSURE]: The provided
generate-secrets.shtemplate extracts sensitive environment variables (such asDATABASE_URLandSECRET_KEY) and writes them into a plaintext Kubernetes manifest file (k8s/app-secrets.yaml) on the local filesystem. Storing unencrypted secrets on disk increases the risk of accidental exposure through version control or unauthorized local access. - [COMMAND_EXECUTION]: The skill utilizes Skaffold
hooksto run shell scripts during the development lifecycle. This mechanism executes local scripts (e.g.,scripts/generate-secrets.sh) with the permissions of the user running Skaffold, which could be exploited if malicious scripts are introduced into the project repository. - [PROMPT_INJECTION]: The instructions contain directives marked "CRITICAL" and "REQUIRED" to enforce specific agent behaviors, such as mandatory Kubernetes context overrides and enforcing localhost-only port binding. While contextually used for safety, this pattern of overriding agent constraints is an common vector for bypassing safety guidelines.
- [INDIRECT_PROMPT_INJECTION]: The skill possesses a surface for indirect injection as it processes project configuration data and has the capability to write files and execute shell commands.
- Ingestion points: Processes project-specific configuration and scripts (SKILL.md).
- Boundary markers: None identified in the provided templates.
- Capability inventory: Access to Bash, Read, Write, Edit, and Grep tools.
- Sanitization: No validation or sanitization of environment variable content before writing to file system.
Recommendations
- HIGH: Downloads and executes remote code from: https://dotenvx.sh - DO NOT USE without thorough review
Audit Metadata