k8s-capi
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE] (HIGH): The skill provides the
capi_cluster_kubeconfig_toolwhich extracts and returns workload cluster access credentials. Exposure of these credentials allows full administrative control over the target Kubernetes clusters. - [COMMAND_EXECUTION] (HIGH): The skill utilizes
kubectl_applyto process YAML manifests. This capability can be abused to deploy unauthorized or malicious resources (such as privileged pods or hostPath mounts) into the management or workload clusters if the manifest generation process is compromised. - [PROMPT_INJECTION] (HIGH): The skill is vulnerable to Indirect Prompt Injection (Category 8). It ingests external user instructions to define infrastructure state. If an attacker provides malicious parameters that are interpolated into YAML templates without strict sanitization, they could escalate privileges or modify unintended clusters. Evidence:
kubectl_applyandcapi_machinedeployment_scale_toolin SKILL.md ingest parameters likename,namespace, andmanifestcontent without visible boundary markers or validation logic.
Recommendations
- AI detected serious security threats
Audit Metadata