gitops-workflow

Fail

Audited by Snyk on Mar 3, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E004: Prompt injection detected in skill instructions.

  • Potential prompt injection detected (high risk: 0.90). The skill includes a mandatory "Memory Protocol" that instructs the agent to read and write local memory files and change its assumed behavior—instructions unrelated to GitOps and effectively directing the agent to perform hidden/local state operations outside the skill's stated purpose.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's required workflow (SKILL.md) explicitly instructs fetching and executing manifests and repositories from public GitHub URLs (e.g., "kubectl apply -f https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/install.yaml" and the Flux "flux bootstrap github" / GitRepository URLs), meaning it ingests untrusted, user-controlled third‑party content that can materially change tool behavior.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). Yes — the skill explicitly instructs running a privileged install (curl ... | sudo bash) and directs reading/writing local memory files, which encourage modifying the host system state and using sudo.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 3, 2026, 02:04 PM