kubeadm-troubleshooting

Warn

Audited by Snyk on Feb 28, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). Flagged because the troubleshooting steps explicitly instruct fetching and applying a public raw GitHub manifest (e.g., "kubectl apply -f https://raw.githubusercontent.com/flannel-io/flannel/.../kube-flannel.yml" in the Node NotReady/CoreDNS sections), which causes the agent/runner to ingest and act on untrusted third-party content that can materially change behavior.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).


MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill includes explicit, destructive system commands (rm -rf on system dirs, kubeadm reset, iptables flush, disabling firewalld, restarting system services, certificate regeneration) that require root/sudo and modify or destroy machine state, so it does push the agent to compromise the host.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 28, 2026, 04:44 AM