kubernetes-flux
Fail
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The documentation in
SKILL.mdprovides instructions to download and execute an installation script fromhttps://fluxcd.io/install.sh. This is an official source for the FluxCD tool. - [COMMAND_EXECUTION]: The skill enables the execution of Kubernetes management commands through
kubectlandflux. This includes high-privilege operations such askubectl exec, which allows the agent to run arbitrary commands inside containerized environments. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection via untrusted data retrieved from the cluster.
- Ingestion points: Data enters the agent context through commands like
kubectl logs,kubectl get events, andflux get allas described inSKILL.mdand implemented inscripts/main.cjs. - Boundary markers: No specific delimiters or instructions to ignore embedded commands are present in the scripts or system prompts.
- Capability inventory: The skill possesses the
Bashtool and utilizeschild_process.spawninscripts/main.cjsto run CLI tools. It supportskubectl execfor remote command execution within pods. - Sanitization: There is no evidence of sanitization, filtering, or validation of the retrieved log data or event messages before they are processed by the agent.
Recommendations
- HIGH: Downloads and executes remote code from: https://fluxcd.io/install.sh - DO NOT USE without thorough review
Audit Metadata