manage-kubernetes-secrets

Fail

Audited by Snyk on Feb 27, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes literal plaintext secrets and CLI commands that embed and decode secret values (e.g., --from-literal=password='sup3rs3cr3t!', aws secretsmanager --secret-string with "dbpass123", and commands to base64-decode secret data), which requires handling or reproducing secrets verbatim.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).


MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). This skill instructs performing host- and cluster-level privileged actions (editing kube-apiserver flags, accessing etcd, installing binaries with sudo, and other admin operations) that modify system/service state and require elevated privileges, so it can compromise the machine the agent runs on.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 27, 2026, 10:52 PM