rke2-deployment
Fail
Audited by Socket on Feb 28, 2026
1 alert found:
MalwareMalwareSKILL.md
HIGHMalwareHIGH
SKILL.md
The deployment guide is coherent with its stated purpose, describing legitimate RKE2 deployment steps, addon customization, verification, and uninstall procedures. While the curl | sh downloader pattern is a recognized security risk if the source is compromised, the document does not itself implement malicious logic. The primary security considerations center on protecting kubeconfig and join tokens, ensuring proper access controls, and validating installer integrity in real environments. Overall risk is moderate: standard ops content with noteworthy data-exposure points and a high-risk installer pattern that should be mitigated with signatures, pinning, and least-privilege practices.
Confidence: 95%Severity: 90%
Audit Metadata