knative
Fail
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: Multiple scripts within the skill (
deploy-service.sh,diagnose.sh,install.sh, andtraffic-split.sh) are designed to access sensitive Kubernetes configuration files at specific paths. - Evidence: The scripts construct paths to kubeconfig files using the pattern
$HOME/.kube/aks-rg-hypera-${CLUSTER}-configand export them to theKUBECONFIGenvironment variable, exposing cluster credentials. - [COMMAND_EXECUTION]: The main skill instructions include the use of
sudofor administrative operations, which is a high-privilege action. - Evidence:
SKILL.mdinstructs the user/agent to executesudo mv func /usr/local/bin/to install a downloaded binary. - [REMOTE_CODE_EXECUTION]: The skill facilitates the download and execution of external binary files, which bypasses package manager security checks.
- Evidence:
SKILL.mdprovides commands to fetch thefuncbinary from GitHub releases usingcurl, apply executable permissions withchmod +x, and move it to a system path. - [EXTERNAL_DOWNLOADS]: The skill relies heavily on fetching configuration and installation manifests from external remote sources during runtime.
- Evidence: The
install.shscript andSKILL.mdperform numerouskubectl apply -foperations targeting various GitHub repository URLs (e.g.,https://github.com/knative/serving/releases/download/...).
Recommendations
- HIGH: Downloads and executes remote code from: https://github.com/knative/func/releases/latest/download/func_linux_amd64 - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata