k8s-check-fix
Pass
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: SAFECOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill functions as a wrapper for the
kubectlCLI, supporting both local and remote execution via SSH. It implements a robust security model using anALLOWLISTfor "fix" operations, ensuring only safe actions likerollout undo,rollout restart,scale,delete pod,cordon, anduncordonare performed. Input is validated against shell meta-characters, and remote commands are properly escaped usingprintf %qto prevent injection. - [CREDENTIALS_UNSAFE]: The skill facilitates remote cluster management by accessing SSH private keys (e.g.,
~/.ssh/id_rsa). To mitigate credential exposure risks, the skill includes explicit instructions for the AI to never reveal these keys, tokens, or Kubernetes secrets in its output. It also relies on user-provided configuration paths for these sensitive files. - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection by processing external data from Kubernetes logs and events.
- Ingestion points: Untrusted data enters the context via
kubectl logsandkubectl get events(found inscripts/subcommands/pod.shandscripts/subcommands/events.sh). - Boundary markers: Present. The skill uses Markdown code blocks and structured reporting templates to delimit external content, and instructions require the AI to warn users about the potential sensitivity of log content.
- Capability inventory: Limited 'fix' operations are available (rollout, scale, delete pod, cordon, uncordon), which are gated by mandatory user confirmation and a strict command whitelist in
scripts/subcommands/fix.sh. - Sanitization: Shell arguments are escaped using
printf %qinscripts/lib/k8s_utils.sh, and JSON parsing is securely handled viajqto prevent command injection.
Audit Metadata