K8s Fta Skill
AdvisoryAudited by Static analysis on Apr 30, 2026.
Overview
No suspicious patterns detected.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If used against the wrong cluster or namespace, the agent could make or recommend changes that disrupt applications or production infrastructure.
The skill explicitly instructs the agent to run kubectl automatically and to perform fixes when needed. Kubernetes repair commands can change live workloads, networking, RBAC, storage, or scaling behavior, but the artifact does not define a tight allowlist or scope for mutating actions.
通过自动执行kubectl命令...自动修复功能...必要时自动执行修复命令
Use only with the intended kubectl context, require explicit approval for every mutating command, and prefer dry-run/read-only checks or a limited RBAC account.
The agent may access sensitive cluster information or act with broader permissions than the user intended, depending on the current kubeconfig context.
These commands use the user’s active Kubernetes credentials and can inspect cluster-wide resources and RBAC configuration. The provided metadata declares no primary credential or required config path, and the instructions do not bound which context, account, or namespace should be used.
kubectl get pods --all-namespaces ... kubectl get clusterrole ... kubectl get clusterrolebinding
Before invoking the skill, verify the active kubectl context and use a least-privilege service account or namespace-scoped credentials where possible.
Sensitive or misleading log content could enter the agent’s working context during troubleshooting.
The skill analyzes pod logs and command output. Logs are expected for troubleshooting, but they may contain secrets, internal hostnames, tokens, or untrusted text from applications.
kubectl logs <pod-name> -n <namespace> ... 分析输出
Review whether logs may contain secrets before sharing them with the agent, and treat log text as data rather than instructions.
The agent may run diagnostic commands inside selected pods, which could be inappropriate for sensitive or production workloads if not targeted carefully.
The evaluation expectations include running kubectl exec inside a pod for DNS diagnostics. This is purpose-aligned, but it is still command execution inside a cluster workload.
Automatically execute kubectl exec nslookup
Confirm the target pod and namespace before allowing kubectl exec, and limit execution to harmless diagnostic commands.
Users have less external context for verifying the author, maintenance history, or safety review of the Kubernetes automation guidance.
The skill has no visible source repository or homepage. That is not malicious by itself, but provenance matters more for a skill that can guide cluster-wide operational actions.
Source: unknown; Homepage: none
Review the SKILL.md content directly and consider using trusted, internally reviewed troubleshooting runbooks for production clusters.
