gitops-workflow
Warn
Audited by Snyk on Feb 27, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's required workflow instructs installing and configuring ArgoCD/Flux to pull manifests from public Git repos (e.g., kubectl apply -f https://raw.githubusercontent.com/argoproj/argo-cd/... and GitRepository.url fields like https://github.com/org/my-app), which are untrusted, user-controlled third-party sources that the agent/agents will read and act on.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill's runtime installation steps fetch and execute remote content — e.g., "curl -s https://fluxcd.io/install.sh | sudo bash" and "kubectl apply -f https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/install.yaml" — which run remote code/manifests and are required to install Flux/ArgoCD.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.80). The prompt includes a "curl ... | sudo bash" Flux install step that explicitly asks for sudo to run a remote installer (modifies the host system with elevated privileges), which risks compromising the machine state.
Audit Metadata