<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>K8sgpt — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/k8sgpt/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 24 Apr 2026 16:41:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/k8sgpt/feed.xml" rel="self" type="application/rss+xml"/><item><title>k8sGPT Operator Vulnerable to Prompt Injection</title><link>https://feed.craftedsignal.io/briefs/2026-04-k8sgpt-prompt-injection/</link><pubDate>Fri, 24 Apr 2026 16:41:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-k8sgpt-prompt-injection/</guid><description>k8sGPT versions before 0.4.32 are vulnerable to prompt injection due to deserialization of AI-generated YAML without proper validation in the auto-remediation pipeline, potentially leading to arbitrary code execution within the Kubernetes cluster.</description><content:encoded><![CDATA[<p>k8sGPT is an open-source project that leverages AI to analyze and remediate Kubernetes cluster issues. A critical vulnerability exists in k8sGPT versions prior to 0.4.32, specifically within the k8sGPT-Operator component. The vulnerability stems from the auto-remediation pipeline in <code>object_to_execution.go</code>, which deserializes AI-generated YAML directly into a Kubernetes Deployment object without adequate validation. This lack of validation allows for prompt injection, where malicious YAML payloads generated by the AI can overwrite or modify existing deployments in unexpected ways. This can be exploited by attackers to gain control over resources within the Kubernetes cluster by crafting malicious AI prompts to inject malicious code into deployment configurations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious prompt designed to generate YAML code that includes malicious configurations (e.g., mounting host volumes, privileged containers).</li>
<li>The k8sGPT-Operator receives the prompt and uses its AI engine to generate a YAML manifest for a Kubernetes Deployment object.</li>
<li>The <code>object_to_execution.go</code> component deserializes the AI-generated YAML manifest directly into a Kubernetes Deployment object.</li>
<li>Due to the lack of validation, the malicious configurations within the YAML manifest are not detected.</li>
<li>The k8sGPT-Operator applies the modified Deployment object to the Kubernetes cluster via the Kubernetes API.</li>
<li>The Kubernetes scheduler creates pods based on the compromised Deployment object, potentially executing malicious code within the cluster.</li>
<li>The attacker gains control over the deployed pod, potentially escalating privileges to other resources within the cluster.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to inject arbitrary code into Kubernetes deployments, potentially leading to full cluster compromise. While the precise number of affected installations is unknown, any k8sGPT deployment prior to version 0.4.32 is susceptible. This could lead to data breaches, denial of service, or complete control over the Kubernetes environment. Organizations using k8sGPT for automated remediation should immediately upgrade to version 0.4.32 or later.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade k8sGPT to version 0.4.32 or later to patch the vulnerability (reference: Affected versions).</li>
<li>Implement additional validation of Deployment objects before applying them to the cluster to prevent malicious configurations (reference: Overview).</li>
<li>Deploy the Sigma rule provided to detect attempts to create privileged containers or mount sensitive host paths (reference: Sigma rule).</li>
<li>Monitor Kubernetes audit logs for suspicious activity related to Deployment object modifications (reference: Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>prompt-injection</category><category>kubernetes</category><category>ai</category><category>vulnerability</category></item></channel></rss>