cluster-api

Warn

Audited by Snyk on Feb 28, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The SKILL.md explicitly instructs fetching and applying remote, public manifests (e.g., downloading clusterctl from https://github.com/..., running clusterctl init which downloads provider components, and kubectl apply -f https://raw.githubusercontent.com/projectcalico/.../calico.yaml), so untrusted third‑party content is ingested as part of the workflow and can materially influence tool behavior.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.90). The prompt includes commands that require sudo (e.g., moving binaries into /usr/local/bin), mounts the host Docker socket into containers, and instructs creating/deleting Docker containers and system-wide clusters—operations that modify host system state and can bypass host security, so it should be flagged.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 28, 2026, 04:44 AM