Kubernetes Triage Expert
v1.0.0Analyze Kubernetes faults using only user-provided evidence. Classify the fault, rank likely hypotheses, request the next highest-value checks, and keep fact...
⭐ 0· 53·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description (Kubernetes triage using only user-provided evidence) matches the SKILL.md: it asks for evidence from the user and explicitly forbids running kubectl or inspecting clusters. No unrelated binaries, env vars, or credentials are required.
Instruction Scope
Instructions are narrowly scoped to analysis of user-provided evidence and include strict hard rules preventing system inspection or command execution. One noteworthy non-security behavior: rule 8 defaults to Chinese if the user's language is unclear, which could surprise English-speaking users — this is a policy choice, not a security issue.
Install Mechanism
No install spec and no code files (instruction-only). Nothing is written to disk and there are no downloads or third-party packages to evaluate.
Credentials
The skill requests no environment variables, credentials, or config paths. That is proportionate to a purely advisory triage skill and reduces risk of secret exfiltration.
Persistence & Privilege
always is false and there are no installation steps that alter system or other skills. The skill can be invoked by the agent (default), which is normal and acceptable given the limited, read-only nature of its instructions.
Assessment
This is an instruction-only triage skill that does not run commands or access your clusters; it can only reason from evidence you provide. Before installing or using it: (1) do not supply cluster credentials or secrets to the skill — it does not need them; (2) expect it to be advisory only (it cannot validate live cluster state or perform fixes); (3) be aware of the language default rule (it may default to Chinese if the intent is unclear); and (4) treat its outputs as diagnostic hypotheses requiring your verification with real cluster checks (kubectl, logs, metrics).Like a lobster shell, security has layers — review code before you run it.
devopsvk97981y2tzdpr6nn33nvr5qx2x84dccxkubernetesvk97981y2tzdpr6nn33nvr5qx2x84dccxlatestvk97981y2tzdpr6nn33nvr5qx2x84dccxsrevk97981y2tzdpr6nn33nvr5qx2x84dccxtriagevk97981y2tzdpr6nn33nvr5qx2x84dccx
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
