docker-containerization
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): Vulnerability to shell command injection in utility scripts.
- Evidence:
- File:
scripts/docker-build.sh(Line 158) executeseval $DOCKER_CMD. The variable$DOCKER_CMDis built from multiple input arguments such asIMAGE_NAME,TAG, andBUILD_ARGSwithout sanitization. - File:
scripts/docker-run.sh(Line 183) executeseval $DOCKER_CMD. The variable is constructed using arguments likeCONTAINER_NAME,IMAGE_NAME, andVOLUMESwithout validation. - Impact: If an AI agent or user passes untrusted data (e.g., a project name derived from an external PR title) to these scripts, an attacker could execute arbitrary code on the host machine using shell metacharacters (e.g.,
;,&,|,`).
Recommendations
- AI detected serious security threats
Audit Metadata