docker-workflows

Warn

Audited by Socket on Feb 16, 2026

1 alert found:

Security
SecurityMEDIUM
SKILL.md

[Skill Scanner] Credential file access detected The skill content is coherent with its purpose of providing Docker workflows for Python/UV projects. However, there is a notable inconsistency: the docker-compose example includes plaintext credentials, which could lead to credential leakage if copied directly. This should be replaced with placeholders or secret management guidance before distribution. Aside from this, the sources/sinks/data flows are typical for containerized Python apps and align with the stated goals. LLM verification: This artifact is a benign documentation skill that provides Dockerfile and docker-compose examples and operational guidance. There are no clear indicators of malicious intent or obfuscated malware in the provided content. However, the examples contain insecure defaults and supply-chain weaknesses (hardcoded credentials, exposed DB port, bind mounts, and unpinned 'latest' images) that could lead to credential leakage or easier compromise if copied verbatim into production environments. Treat the

Confidence: 75%Severity: 75%
Audit Metadata
Analyzed At
Feb 16, 2026, 12:30 PM
Package URL
pkg:socket/skills-sh/autumnsgrove%2Fgroveengine%2Fdocker-workflows%2F@2351937c0583f16e99a888824391410ac5378a9e