/audit-outdated
The /audit-outdated skill looks for version drift across every layer of the cluster: control plane, nodes, container images, Helm charts, CRDs, operators, and the API surface your manifests target. Each layer has its own notion of “latest” and its own drift tolerances.
Run it without arguments for a full sweep, or name a workflow to scope the report.
/audit-outdated # full sweep/audit-outdated images # single workflow/audit-outdated cves in kube-systemNatural-language scoping (namespaces, label selectors, severity thresholds) is supported on every workflow (see Overview).
Workflows
Section titled “Workflows”1. Kubernetes version skew
Section titled “1. Kubernetes version skew”Sources: the published Kubernetes release schedule.
2. Deprecated & removed API versions
Section titled “2. Deprecated & removed API versions”Sources: pluto and kubent when available, with the published Kubernetes API deprecation schedule as a fallback.
3. Container image freshness
Section titled “3. Container image freshness”Sources: Docker Hub, GHCR, quay.io, and gcr.io. Currently, private registries are not supported.
4. Helm charts & releases
Section titled “4. Helm charts & releases”Sources: the configured Helm repo indexes. OCI-hosted charts are read directly from the OCI registry.
5. Operators, CRDs, and their controllers
Section titled “5. Operators, CRDs, and their controllers”Sources: reuses the registry and Helm repo data from workflows 3 and 4.
6. Known vulnerabilities
Section titled “6. Known vulnerabilities”Sources: Trivy and the official Kubernetes CVE feed.
7. Node OS & kernel
Section titled “7. Node OS & kernel”Sources: distro release feeds for the latest published OS and kernel versions, and the CISA KEV catalog for escalating actively exploited kernel CVEs.
Data freshness
Section titled “Data freshness”Every report includes a “data age” footer: when each index (Trivy DB, Helm repos, registry tag lists, Kubernetes release schedule) was last refreshed.
What the agent is told
Section titled “What the agent is told”Beyond the workflows, the skill briefs the agent on how to report:
- Always include the data-age footer — stale indexes produce stale findings, and the reader needs to know.
- De-duplicate by image digest so one outdated image shared across many pods doesn’t dominate the report.
- Include severity and CISA KEV status for CVE entries when available; rank KEV hits above CVSS-high findings without known exploitation.
- Distinguish “drift within the supported window” from “EOL” explicitly — the first is routine, the second is urgent.
- For registries not in the supported list (workflow 3), say so rather than silently skipping the image.
- Hand off to
/investigatewhen a single workload’s outdated image is the focus.