implementing-microsegmentation-with-guardicore
Warn
Audited by Snyk on Apr 20, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill explicitly downloads and executes a remote installer at runtime using curl to https://management.guardicore.com/api/v3.0/agents/download/linux (and the corresponding /agents/download/windows) which fetches and runs remote code as a required step to deploy the Guardicore agent.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The prompt explicitly instructs installing privileged agents (including running a sudo installer and deploying a privileged DaemonSet that mounts the host root and uses hostPID/privileged=true), which requires root access and can modify the host/system state and fully compromise the machine.
Issues (2)
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata