Eks Workload Best Practice Assessment

ReviewAudited by ClawScan on May 10, 2026.

Overview

This instruction-only EKS assessment skill is purpose-aligned, but it needs broad Kubernetes/AWS read access and includes optional high-privilege setup examples users should treat carefully.

This skill appears suitable for EKS workload assessment, but run it with the least-privilege AWS and Kubernetes credentials you can. Confirm the target cluster and namespace scope, consider opting out of the default infrastructure-layer add-on if not needed, and do not blindly apply the README’s cluster-admin setup example in production.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may inspect broad Kubernetes configuration, including workload specs and RBAC metadata.

Why it was flagged

The skill relies on kubectl commands that can read broad cluster workload and RBAC configuration. This is expected for an EKS best-practice assessment, but users should ensure the correct cluster and scope are selected.

Skill content
kubectl get deployments {NAMESPACE_FILTER} -o json
kubectl get clusterrolebindings -o json
kubectl get clusterroles -o json
Recommendation

Run it only against intended clusters and namespaces, and use read-only Kubernetes permissions where possible.

What this means

If followed as-is, the EC2 role or principal could gain broad administrative control over the EKS cluster.

Why it was flagged

The README provides a user-directed setup example that grants cluster-wide EKS admin access. It also advises using more restrictive policies in production, so this is disclosed rather than hidden, but it is broader than a read-only assessment usually needs.

Skill content
--policy-arn arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy \
  --access-scope type=cluster
Recommendation

Avoid granting cluster-admin for assessment unless truly required; prefer least-privilege read-only access scoped to the target namespaces or resources.

What this means

The agent may send best-practice search queries to external MCP providers during the assessment.

Why it was flagged

The workflow depends on external MCP documentation tools. The artifacts show these are used for best-practice research, not for sending collected cluster data, but users should still trust the configured MCP servers.

Skill content
This skill requires:

- **[aws knowledge mcp server]** tools:
  - `aws___search_documentation`
  - `aws___read_documentation`
- **[context7 MCP]** tools:
Recommendation

Use trusted MCP server configurations and avoid including sensitive cluster details in documentation-search queries unless needed.

What this means

The assessment may include additional infrastructure review using another skill, potentially causing broader AWS/EKS inspection than the user expected.

Why it was flagged

The skill can invoke another skill by default to add infrastructure-layer results. This is disclosed and related, but it broadens the assessment beyond workload-only checks.

Skill content
If infrastructure layer assessment is included (default: yes):

1. Invoke the `aws-best-practice-research` skill
Recommendation

Opt out of infrastructure-layer assessment if you only want workload-level checks, and review the other skill before allowing it to run.