kubernetes
Pass
Audited by Gen Agent Trust Hub on Apr 18, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes data from potentially untrusted sources (e.g., namespace or pod names) and uses them as arguments in scripts without sufficient boundary markers or sanitization.\n
- Ingestion points: Arguments provided to the helper scripts in the
scripts/directory and command placeholders inSKILL.md.\n - Boundary markers: Absent; there are no delimiters to separate trusted instructions from untrusted external data.\n
- Capability inventory: The skill has high-privilege access to cluster management tools like
kubectlandoc, which can modify or delete cluster resources.\n - Sanitization: Absent; input is directly interpolated into command strings.\n- [COMMAND_EXECUTION]: The helper scripts, such as
security-audit.shandargocd-app-sync.sh, are vulnerable to command and argument injection. They expand variables like$NS_FLAGor$APPdirectly into shell commands or within partially quoted strings. This could allow an attacker to execute arbitrary commands or manipulate flags by providing input that includes shell metacharacters or closing quotes.
Audit Metadata