Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

K3s Kubernetes Deploy

v1.0.0

自动化部署 K3s Kubernetes 集群到多台 Linux 服务器。支持自动镜像拉取、网络配置检测、CNI 插件安装。使用场景:(1) 从零部署 K3s 集群,(2) 修复 NotReady 节点,(3) 批量部署多节点集群。触发条件:用户提到 K3s、Kubernetes 部署、集群安装、节点加入等。

0· 136·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill's stated purpose (deploy K3s to multiple Linux hosts) matches what the scripts attempt to do, but the package declares no required binaries or credentials while the scripts clearly require ssh/sshpass/scp, docker/containerd, curl, systemctl and kubectl. The lack of declared runtime requirements is an inconsistency that could mislead users about what will be needed and what access the skill will use.
!
Instruction Scope
SKILL.md and included scripts instruct the agent/user to run remote operations that require SSH access and privileged actions on target machines: disabling swap, running get.k3s.io installer, writing CNI files under /etc, restarting services, pulling images from external registries, and creating kubeconfigs. The scripts store the cluster node-token and save kubeconfig, and modify kubeconfig to listen on 0.0.0.0 — actions that expose sensitive cluster credentials. The instructions also advise passing plaintext passwords on the command line, which risks credential leakage (shell history, process lists).
Install Mechanism
There is no install spec (instruction-only), so nothing is automatically downloaded/installed by the registry. However, included scripts perform network downloads at runtime (curl https://get.k3s.io and pull container images from third-party registries). This runtime network activity is expected for the task but should be noted: it will fetch code and images from external hosts.
!
Credentials
The skill declares no required environment variables or credentials but the scripts demand SSH credentials (user/password) and effectively log/emit the k3s node-token to /tmp/k3s-token.txt and generate kubeconfig files. Requiring plaintext passwords as CLI arguments and writing cluster tokens to /tmp is disproportionate and risky; credentials are not limited or scoped and are not documented as required env vars despite being central to operation.
!
Persistence & Privilege
The skill does not request platform-level persistence, but the scripts create and modify sensitive files on target hosts (CNI config in /etc/cni/net.d, kubeconfig under ~/.kube/config on the remote user, /tmp/k3s-token.txt and /tmp/cluster-info.txt). The kubeconfig modification to change 127.0.0.1 to 0.0.0.0 (and attempt to replace with $host) can expose the API endpoint and broaden access if used as-is. These are legitimate deployment effects but increase the attack surface and require careful handling.
What to consider before installing
This skill appears to implement a working K3s deployment but is sloppy and potentially unsafe in places — treat it as suspicious until you review and harden it: - Don't pass plaintext passwords on the command line. Prefer SSH key-based auth or at least SSHPASS via secure environment variables, and avoid storing passwords in shell history or using unsecured process arguments. - Inspect the scripts locally before running. Pay attention to lines that write /tmp/k3s-token.txt, modify kubeconfigs, create /etc/cni files, and run curl https://get.k3s.io. These reveal or expose cluster credentials. - The package declares no required tools but the scripts require ssh/sshpass/scp, curl, docker/containerd, kubectl and systemctl — ensure those exist and that use of sshpass is acceptable in your environment. - The scripts change kubeconfig addresses (attempts to replace 127.0.0.1 with 0.0.0.0 and $host). Verify and correct that behavior so you don't accidentally expose the API server to all interfaces. - Run the deployment first in an isolated test environment (throwaway VMs) to validate behavior and to see exactly what files are created and what network connections are made (image registries, get.k3s.io). - After a successful run, rotate any tokens/credentials that were generated or exposed and remove temporary files like /tmp/k3s-token.txt. Limit access to generated kubeconfigs and store them securely. - Consider using a vetted deployment tool or implementing SSH key auth and vault-backed secrets in place of passing passwords. If you need help auditing or hardening the scripts, review the exact lines that use sshpass, echo/piping of passwords, and kubeconfig edits. Confidence note: the issues look like sloppy/insecure engineering rather than explicit malicious behavior, but the combination of undeclared credential use, plaintext passwords, and token exposure justifies caution.

Like a lobster shell, security has layers — review code before you run it.

latestvk97c8t00exvz52jvhb0k66drm5832jpg

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments