k8s-webhook-abuse
Fail
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [DATA_EXFILTRATION]: The primary purpose of the skill is to exfiltrate sensitive data, such as secrets and flags, from Kubernetes Mutating Webhooks by spoofing internal API Server requests.
- Evidence: Phase 3 in
SKILL.mddescribes extracting and decoding theresponse.patchfield from a forged Webhook response to reveal injected environment variables and secrets. - [COMMAND_EXECUTION]: The skill utilizes command-line tools to perform network reconnaissance and active exploitation within a Kubernetes environment.
- Evidence:
SKILL.mdinstructs the use ofk8spider scanfor service discovery andcurlwith the-k(insecure) flag to POST forged JSON payloads to internal service endpoints. - [CREDENTIALS_UNSAFE]: The described workflow is explicitly designed to harvest credentials and sensitive configuration data (tokens, secrets) that are dynamically injected into Kubernetes resources.
- Evidence: The skill description and Phase 2 outline techniques for 'tricking' the Webhook into returning patches intended for privileged Pods, containing secrets or flags.
Recommendations
- AI detected serious security threats
Audit Metadata