rke2-operations
Warn
Audited by Snyk on Feb 28, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill includes runtime execution of remote content — notably "curl -sfL https://get.rke2.io | INSTALL_RKE2_CHANNEL=... sh -" which pipes and runs a remote installer, and it fetches and applies remote Kubernetes manifests from https://github.com/rancher/system-upgrade-controller/releases/latest/download/crd.yaml and https://github.com/rancher/system-upgrade-controller/releases/latest/download/system-upgrade-controller.yaml (both fetched at runtime and required to install the controller), so these URLs execute remote code and are required dependencies.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt explicitly instructs privileged system changes (systemctl stop/start/restart, rke2 certificate rotate, installing via curl|sh, copying files under /etc and /var/lib, and deploying an upgrade controller that mounts the host root and uses elevated capabilities), which modify the host state and require root privileges.
Audit Metadata