implementing-pod-security-admission-controller

Warn

Audited by Snyk on Mar 16, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The included script scripts/agent.py performs HTTP GETs to a user-specified --target (e.g., requests.get("{target}/api/v1/status" and "/api/v1/compliance")), parsing untrusted/third‑party JSON into findings that directly determine the generated report and risk_level, so external content can influence the agent's workflow and decisions.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt instructs modifying cluster control-plane files under /etc/kubernetes (adding /etc/kubernetes/psa-config.yaml and editing kube-apiserver manifests), which are system files requiring root/sudo and thus alter the machine's privileged state.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 16, 2026, 03:41 PM
Issues
2