Kubernetes Skills

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: k8s-browser Version: 1.0.0 The skill bundle provides extensive browser automation capabilities, including opening arbitrary URLs, injecting custom headers (e.g., Authorization tokens), filling forms with credentials, retrieving full page content, and taking screenshots. While these capabilities are plausibly needed for its stated purpose of 'Browser automation for Kubernetes dashboards and web UIs', they represent significant security risks. The `SKILL.md` file explicitly demonstrates the use of sensitive data like `admin-token` and `password` in examples, highlighting the potential for an AI agent to be prompted to access or manipulate sensitive internal web interfaces, leading to unauthorized data exposure or actions if misused via prompt injection.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used against a production ArgoCD instance, the agent could roll out or reconcile application changes.

Why it was flagged

The documented browser workflow can trigger an ArgoCD application sync, which may change Kubernetes cluster state. This matches the skill's purpose but is a high-impact UI action.

Skill content
# 4. Sync application
browser_click(selector="button.sync-button")
browser_click(selector="text=Synchronize")
Recommendation

Require explicit user approval and confirm the target cluster, namespace, and application before sync, deploy, delete, or other state-changing UI actions.

What this means

Credentials entered into an automated browser session could authorize sensitive reads or changes in Kubernetes, Grafana, or ArgoCD.

Why it was flagged

The skill documents using bearer tokens and admin login fields in browser automation. These are placeholders and are purpose-aligned, but they represent privileged dashboard access.

Skill content
headers={"Authorization": "Bearer admin-token"}
...
browser_fill(selector="input[name=username]", text="admin")
browser_fill(selector="input[name=password]", text="password")
Recommendation

Use least-privilege, short-lived credentials where possible, avoid pasting real secrets into prompts or logs, and close sessions after use.

What this means

Sensitive operational data could leave the local environment if a cloud browser provider is enabled.

Why it was flagged

The skill supports an optional cloud browser provider. When used for Kubernetes, Grafana, or ArgoCD pages, sensitive page content, screenshots, URLs, or authenticated sessions may be handled by that provider.

Skill content
# Optional: Cloud provider
export MCP_BROWSER_PROVIDER=browserbase  # or browseruse
export BROWSERBASE_API_KEY=bb_...
Recommendation

Prefer a local browser for sensitive clusters, or verify the provider's security and data-handling policy before using it with authenticated dashboards.