kubernetes

clawhub:kubernetes

View source
B
84/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

7

Score

84/100

MEDIUM 2
LOW 5

Findings (7)

MEDIUM
Capability escalation
L203

Detects excessive or dangerous capability requests in MCP configurations

capabilities:
              drop: ["ALL
FIX

Restrict the tool to well-defined scopes and prevent it from requesting all permissions. Implement least-privilege access controls and audit permission grants.

FP?

Likely FP if the match is a tool description documenting available permission scopes, not a tool that actually requests overly broad access.

MEDIUM
Kubernetes service discovery
L433

Detects Kubernetes internal service URLs and secret paths

kubernetes.default.svc
FIX

Validate and sanitize all user-provided URLs before making server-side requests. Resolve DNS and verify the IP is not in a private range before connecting.

FP?

Likely FP if the URL fetch is for a well-known public API endpoint that is hardcoded (not user-controlled) in the tool configuration.

LOW
Shell script file execution
L112

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/cluster-health-check.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L301

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/generate-manifest.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L312

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/security-audit.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L521

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/argocd-app-sync.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L541

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/<script-name>.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.