kubernetes-production

Pass

Audited by Gen Agent Trust Hub on Apr 18, 2026

Risk Level: SAFE
Full Analysis
  • [SAFE]: No malicious patterns, obfuscation, or persistence mechanisms were detected. The instructions are aligned with best practices for cluster security and reliability.
  • [EXTERNAL_DOWNLOADS]: Fetches configuration assets and infrastructure operators (Kyverno, Gatekeeper, Velero, OpenCost, Prometheus stack) from trusted and official repositories managed by established organizations in the Cloud Native ecosystem.
  • [CREDENTIALS_UNSAFE]: Includes connection string templates in references/secrets-external-secrets.md. Analysis confirms these are non-functional placeholders (e.g., {{ .username }}, {{ .password }}) intended for use with the External Secrets Operator's template system and do not represent hardcoded credentials.
  • [COMMAND_EXECUTION]: Provides guidance on executing administrative commands using standard Kubernetes tools (kubectl, helm, velero) for cluster management and auditing.
  • [DATA_EXFILTRATION]: Documents standard procedures for backing up cluster state and volume data to external object storage for disaster recovery, which is the intended functional purpose of the backup section.
  • [PROMPT_INJECTION]: No attempts to subvert AI behavioral constraints were identified. Regarding Indirect Prompt Injection (Category 8): Ingestion points: User-provided project context and constraints (SKILL.md); Boundary markers: Absent; Capability inventory: Administrative shell execution (kubectl, helm) and cluster configuration modification; Sanitization: Absent.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 18, 2026, 01:40 AM