k8s-policy
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): The skill's prerequisites section instructs the user to download Kubernetes manifests from remote sources that are not on the trusted organization list.\n
- Evidence:
https://github.com/kyverno/kyverno/releases/latest/download/install.yamlin SKILL.md\n - Evidence:
https://raw.githubusercontent.com/open-policy-agent/gatekeeper/master/deploy/gatekeeper.yamlin SKILL.md\n- REMOTE_CODE_EXECUTION (HIGH): The skill directs the use ofkubectl apply -forkubectl create -fwith remote URLs. This pattern effectively downloads and executes external configuration code on the Kubernetes cluster. Since the sources are not trusted, this allows for potential cluster compromise.\n- PROMPT_INJECTION (LOW): The skill possesses a surface for indirect prompt injection by ingesting and displaying data from cluster policies and audit reports.\n - Ingestion points:
kyverno_clusterpolicy_get_tool,kyverno_policyreports_list_toolin SKILL.md\n - Boundary markers: Absent\n
- Capability inventory:
kubectl_applyallows modifications to the cluster\n - Sanitization: Absent
Recommendations
- AI detected serious security threats
Audit Metadata