Kubernetes Agent Swarm

WarnAudited by ClawScan on May 10, 2026.

Overview

This appears to be a legitimate Kubernetes operations skill, but it asks agents to use powerful cluster, cloud, registry, and GitOps commands that could change or delete production systems.

Use this skill only if you intentionally want an agent to help operate Kubernetes/OpenShift infrastructure. Start with read-only or non-production credentials, explicitly approve every mutation, avoid production cluster-admin/cloud-admin tokens, disable autonomous heartbeat behavior unless needed, and review persistent memory/log files for sensitive data.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If run with production credentials, the agent could change or delete deployed applications and their resources.

Why it was flagged

These raw GitOps commands can remove, replace, or delete live Kubernetes resources. The file includes approval warnings, but the commands are high-impact and not bounded to a specific cluster, namespace, or non-production environment.

Skill content
argocd app sync my-app --prune
argocd app sync my-app --force
argocd app delete my-app --cascade
Recommendation

Use only scoped service accounts, require explicit per-command approval, prefer dry-run/diff workflows first, and restrict production force/prune/delete operations to humans.

What this means

Installing or using the skill with broad credentials could let the agent mutate clusters, cloud infrastructure, registries, and deployment systems.

Why it was flagged

The skill expects Kubernetes and optional cloud credentials that can carry broad administrative authority, while the registry metadata says no required credentials or environment variables.

Skill content
requires:
  env:
    - KUBECONFIG
optional_env:
  - AWS_ACCESS_KEY_ID
  - AWS_SECRET_ACCESS_KEY
  - AZURE_CLIENT_SECRET
  - GOOGLE_APPLICATION_CREDENTIALS
credentials:
  - kubeconfig: "KUBECONFIG path or ~/.kube/config for cluster access"
  - cloud: "Optional cloud provider credentials for managed clusters"
Recommendation

Provide least-privilege, non-production credentials by default; avoid cluster-admin and cloud-admin profiles; document exactly which contexts and accounts the skill may use.

What this means

An agent could keep monitoring, routing, or preparing actions in the background if the platform honors the heartbeat model.

Why it was flagged

The skill describes recurring heartbeat behavior and agents attempting resolution. No executable scheduler is included, but if the host implements these instructions, activity may continue beyond a single user request.

Skill content
heartbeat: "*/5 * * * *"

## Heartbeat Schedule
*/5  * * * *  Atlas, Pulse, Shield     (fast response: incidents, alerts, CVEs)
...
Agent detects issue
Agent attempts resolution within guardrails
Recommendation

Disable autonomous scheduling unless intended, and require human approval before any heartbeat-triggered mutation or production action.

What this means

Incorrect, sensitive, or maliciously edited memory/log entries could affect later cluster operations or expose operational information.

Why it was flagged

The skill uses persistent memory and logs that can influence future agent behavior and may accumulate operational details over time.

Skill content
This repository serves as the single source of truth for cluster operations automation.

All future agent actions should update relevant log files.

## Critical Rules (Always Remember)
Recommendation

Restrict write access to memory/log files, review changes, and never store secret values or full credential outputs in persistent notes.

What this means

Operational details or sensitive incident context could be shared more broadly than intended across the swarm.

Why it was flagged

The intended shared-comment communication model can propagate context among agents, but the artifacts do not define identity checks, origin validation, or data boundaries for those comments.

Skill content
Agents communicate via @mentions in shared task context
Commenting on a task → auto-subscribe to thread
Being @mentioned → auto-subscribe
Once subscribed → receive ALL future comments on heartbeat
Recommendation

Keep shared task comments free of secrets, restrict who can mention/subscribe agents, and require agents to treat comments as untrusted context.