kubespray-lab-setup
Fail
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The bootstrap scripts
admin-lb.shandinit_cfg.shboth configure a hardcoded root password (qwe123) using thechpasswdcommand across all nodes in the lab environment. - [COMMAND_EXECUTION]: Provisioning scripts execute commands to permanently disable the system firewall (
firewalld) and disable SELinux enforcement (setenforce 0) to facilitate cluster networking. - [COMMAND_EXECUTION]: The skill modifies
/etc/ssh/sshd_configto enablePermitRootLoginandPasswordAuthentication, which significantly lowers the default security posture of the virtual machines. - [REMOTE_CODE_EXECUTION]: The admin bootstrap script fetches the Helm installation script from the project's official repository and executes it directly through the shell using
bash. - [EXTERNAL_DOWNLOADS]: The skill downloads various software components from official and well-known sources, including the
k9sbinary from GitHub, thekubesprayrepository, and Kubernetes RPM packages from the officialpkgs.k8s.ioregistry.
Recommendations
- AI detected serious security threats
Audit Metadata