Security Audit
gitops-workflow
github.com/sickn33/antigravity-awesome-skillsTrust Assessment
gitops-workflow received a trust score of 65/100, placing it in the Caution category. This skill has some security considerations that users should review before deployment.
SkillShield's automated analysis identified 2 findings: 1 critical, 1 high, 0 medium, and 0 low severity. Key findings include Unpinned remote Kubernetes manifest application, Direct execution of remote script with root privileges.
The analysis covered 4 layers: Manifest Analysis, Static Code Analysis, Dependency Graph, LLM Behavioral Safety. The LLM Behavioral Safety layer scored lowest at 55/100, indicating areas for improvement.
Last analyzed on February 20, 2026 (commit e36d6fd3). SkillShield performs automated 4-layer security analysis on AI skills and MCP servers.
Layer Breakdown
Behavioral Risk Signals
Security Findings2
| Severity | Finding | Layer | Location | |
|---|---|---|---|---|
| CRITICAL | Direct execution of remote script with root privileges The skill instructs the user to download and execute a shell script from a remote URL (`https://fluxcd.io/install.sh`) directly into `sudo bash`. This allows arbitrary code execution with root privileges on the user's system. If the remote script is compromised or malicious, it poses a severe command injection and supply chain security threat, potentially leading to full system compromise. Strongly recommend against piping remote scripts directly to a shell, especially with `sudo`. Instead, advise users to download the script, review its contents thoroughly, and then execute it locally. Alternatively, suggest using a package manager if available, or a version-pinned and checksum-verified download. | LLM | SKILL.md:86 | |
| HIGH | Unpinned remote Kubernetes manifest application The skill instructs the user to apply Kubernetes manifests directly from a remote URL (`https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/install.yaml`). This method does not pin to a specific version or content hash, making the installation vulnerable to supply chain attacks. If the remote repository or file is compromised, malicious changes to the manifest could be applied to the user's Kubernetes cluster without explicit review. Recommend downloading the manifest, reviewing its content, and applying it locally, or using a version-pinned URL (e.g., specific commit hash or release tag) to ensure integrity and prevent unexpected changes. | LLM | SKILL.md:36 |
Scan History
Embed Code
[](https://skillshield.io/report/8f440dc38cd5a0f0)
Powered by SkillShield