docker-containerization
Warn
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The management scripts
scripts/docker-build.shandscripts/docker-run.shuse theevalstatement to execute shell commands constructed from variables derived directly from user-supplied arguments. - Evidence (scripts/docker-build.sh):
eval $DOCKER_CMDat line 124. The$DOCKER_CMDstring includes variables likeIMAGE_NAME,TAG, andPLATFORMwhich are not sanitized before execution. - Evidence (scripts/docker-run.sh):
eval $DOCKER_CMDat line 155. This follows an identical pattern, interpolating multiple variables includingCONTAINER_NAMEandVOLUMESinto anevalcall. - Impact: An attacker or a compromised automated system providing a malicious string as a parameter (e.g., a semicolon followed by a system command) could achieve arbitrary code execution on the host environment.
- DATA_EXFILTRATION (SAFE): The provided
.dockerignorefile correctly identifies and excludes sensitive local files such as.env,.pem, and.gitdirectories, preventing accidental exposure within the container images. - EXTERNAL_DOWNLOADS (SAFE): Base images in the Dockerfiles target official and well-maintained repositories (
node:18-alpine,nginx:alpine) on Docker Hub.
Audit Metadata