helm-chart-scaffolding
Pass
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- COMMAND_EXECUTION (LOW): The script
scripts/validate-chart.shexecutes several shell commands and calls thehelmbinary to process a local directory. Evidence:scripts/validate-chart.shinvokeshelm lint(line 78),helm template(line 107), andhelm install --dry-run(line 116) on the$CHART_DIRvariable. Context: These operations are necessary for the skill's primary purpose of chart validation, but they involve running logic against potentially untrusted local files. - INDIRECT_PROMPT_INJECTION (LOW): The skill processes external chart data which could be crafted to exploit vulnerabilities in the parsing tools (like Helm) or influence the agent's interpretation of results. 1. Ingestion points:
scripts/validate-chart.sh(lines 57, 63, 69) andassets/templates. 2. Boundary markers: Absent. The script processes files directly without delimiters. 3. Capability inventory: Local command execution (helm,grep,awk,jq) and file reading. 4. Sanitization: Basic shell quoting is used, but there is no validation of the content ofChart.yamlorvalues.yamlbefore processing. - CREDENTIALS_UNSAFE (SAFE): The template file
assets/values.yaml.templatecontains a placeholder password. Evidence: Line 152:password: changeme. Context: This is a common pattern for documentation and templates and is not a functional credential.
Audit Metadata