gitops-pipeline-developer

Warn

Audited by Socket on Apr 28, 2026

1 alert found:

Anomaly
AnomalyLOW
assets/shared-library/resources/pod-template.yaml

No explicit malicious payload is evident in the provided Pod manifest alone; however, it sets up a CI build environment with materially increased attack surface and blast radius: a BuildKit daemon listens on tcp://0.0.0.0:1234 and runs with weakened isolation (Unconfined seccomp and no-process-sandbox). The tools container mounts multiple high-value secrets (registry credentials, SSH key, Vault token, optional Slack webhook) for long-lived use. Malicious behavior (e.g., credential harvesting or webhook exfiltration) would most likely occur in the omitted runtime scripts/pipeline steps, so those components require review to confirm safe handling and restricted build access.

Confidence: 60%Severity: 68%
Audit Metadata
Analyzed At
Apr 28, 2026, 06:49 AM
Package URL
pkg:socket/skills-sh/MKAbuMattar%2Fskills%2Fgitops-pipeline-developer%2F@8e2b984832c0b8f6a981a0e44e9ee858f9d271e1