implementing-network-policies-for-kubernetes

Pass

Audited by Gen Agent Trust Hub on Mar 19, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The scripts scripts/agent.py and scripts/process.py utilize the subprocess module to execute kubectl commands against the cluster. This is the intended functionality of the skill to perform security audits on Kubernetes namespaces, pods, and policies.
  • [PROMPT_INJECTION]: The auditing scripts create an indirect prompt injection surface by ingesting and processing data from external sources (Kubernetes cluster metadata).
  • Ingestion points: scripts/agent.py and scripts/process.py read JSON output from kubectl commands to inspect cluster state.
  • Boundary markers: None. The scripts do not implement delimiters or 'ignore' instructions for the retrieved cluster data.
  • Capability inventory: The scripts possess capabilities to execute system commands (subprocess.run) and write audit results to the local filesystem.
  • Sanitization: No explicit sanitization or validation logic is applied to cluster metadata (e.g., pod names, labels) before inclusion in the final JSON reports.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 19, 2026, 07:17 PM