cloud-k8s-deployment

Fail

Audited by Gen Agent Trust Hub on Feb 21, 2026

Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
  • Privilege Escalation (HIGH): The skill includes instructions to use sudo mv to move a downloaded binary (doctl) into /usr/local/bin. This allows the agent to modify system-level directories and requires elevated permissions.
  • External Downloads (HIGH): The skill downloads an executable binary directly from a GitHub release (digitalocean/doctl). Because 'digitalocean' is not included in the 'Trusted GitHub Organizations' list, this is classified as an unverifiable external download and execution.
  • Command Execution (MEDIUM): The skill adds multiple third-party Helm repositories (e.g., ingress-nginx, jetstack, dapr, strimzi, prometheus-community) and installs software from them, which introduces a large surface area for supply chain attacks.
  • Credential Handling (LOW): The skill provides patterns for creating Kubernetes secrets using kubectl create secret ... --from-literal. While using placeholders, this pattern encourages passing sensitive information (like API keys and database URLs) as plain-text command-line arguments, which can be captured in shell history or process logs.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 21, 2026, 12:23 PM