cloud-k8s-deployment
Fail
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- Privilege Escalation (HIGH): The skill includes instructions to use
sudo mvto move a downloaded binary (doctl) into/usr/local/bin. This allows the agent to modify system-level directories and requires elevated permissions. - External Downloads (HIGH): The skill downloads an executable binary directly from a GitHub release (
digitalocean/doctl). Because 'digitalocean' is not included in the 'Trusted GitHub Organizations' list, this is classified as an unverifiable external download and execution. - Command Execution (MEDIUM): The skill adds multiple third-party Helm repositories (e.g., ingress-nginx, jetstack, dapr, strimzi, prometheus-community) and installs software from them, which introduces a large surface area for supply chain attacks.
- Credential Handling (LOW): The skill provides patterns for creating Kubernetes secrets using
kubectl create secret ... --from-literal. While using placeholders, this pattern encourages passing sensitive information (like API keys and database URLs) as plain-text command-line arguments, which can be captured in shell history or process logs.
Recommendations
- AI detected serious security threats
Audit Metadata