dockerfile-validator

Fail

Audited by Snyk on Mar 4, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill explicitly instructs the agent to read and print Dockerfile contents (sed), run grep that will surface matching secret/token lines, and produce code-level fixes without any redaction rules, so it can require emitting secret values verbatim.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.70). The skill's explicit Fallback A instructs running docker build --no-cache -f "$TARGET_DOCKERFILE" "$DOCKERFILE_DIR", which will cause the Docker daemon to pull base images and execute any networked RUN/CURL commands in the Dockerfile (i.e., content from public registries or arbitrary URLs), meaning untrusted third‑party content can be fetched and influence validation/output.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

Audit Metadata
Risk Level
HIGH
Analyzed
Mar 4, 2026, 08:54 AM