use-k3sup

Fail

Audited by Socket on Mar 7, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The skill demonstrates coherent purpose and workflow for provisioning k3s via k3sup/k3sup-pro across local and remote VMs. However, it exhibits a notable supply-chain risk due to the curl|bash installer pattern for arkade (unverifiable binary installation from an external URL) and potential exposure of SSH-related paths in documentation and automation. Data flows largely stay within standard SSH and kubeconfig contexts, but the initial install chain from a remote script warrants heightened scrutiny. Overall, the footprint is suspicious but not blatantly malicious; treat as high-risk due to the unverifiable binary install and ensure strict provenance checks, signature verification, and minimal, auditable automation before enabling in production environments.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 7, 2026, 12:38 PM
Package URL
pkg:socket/skills-sh/slicervm%2Fagent-skills%2Fuse-k3sup%2F@b10e947e4a5460f02bc1be5c12928486cc921fbb