k8s-container-escape
Fail
Audited by Snyk on May 4, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This content is explicitly malicious: it provides step‑by‑step instructions for credential theft, privilege escalation, remote code execution, persistent backdoor installation, and data exfiltration within Kubernetes clusters and cloud providers.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs techniques to escape containers and perform host/cluster compromise (mount host FS, chroot, use docker socket, create privileged Pods, access kubelet/etcd), which directly aim to bypass protections and modify the machine/cluster state.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata