argocd-tactics
Fail
Audited by Snyk on May 9, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This content is explicit malicious exploitation guidance: it documents vulnerabilities and step‑by‑step post‑exploitation techniques (Redis cache poisoning for cluster takeover, SSO bypass, token/credential theft, SSRF, and deployment of malicious Applications) intended to compromise, maintain access to, and control Argo CD / Kubernetes environments.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill's example Argo CD Application specifies a repoURL "https://github.com/attacker/evil-manifests" which at runtime causes Argo CD to fetch and apply remote manifests (executing remote code), so this external URL directly controls execution and is required for the demonstrated exploit.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata