k8s-istio-bypass
Fail
Audited by Snyk on Apr 22, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This content is explicitly malicious: it provides step-by-step techniques to bypass Istio/Envoy enforcement (UID 1337), escalate/assume the istio user, access Envoy admin endpoints, and read mTLS certificates and secrets—facilitating unauthorized access, credential theft, and data exfiltration.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs the agent to bypass security controls (use su/runuser/nsenter to assume UID 1337), access admin interfaces and secret files, and evade Istio/Envoy policies—actions that are direct security bypasses and can compromise the host/container state.
Issues (2)
E006
CRITICALMalicious code pattern detected in skill scripts.
W013
MEDIUMAttempt to modify system services in skill instructions.
Audit Metadata