docker-install-agentjet-swarm-server

Pass

Audited by Gen Agent Trust Hub on Mar 12, 2026

Risk Level: SAFEREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill executes a convenience script from Docker's official domain (get.docker.com) using a piped shell command. As Docker is a well-known service and the action is required for the stated purpose, this is documented as a standard procedure.
  • [COMMAND_EXECUTION]: Administrative privileges (sudo) are used to perform system updates, install drivers, and configure system services. These high-privilege commands are necessary for the installation of Docker and GPU-related toolkits.
  • [EXTERNAL_DOWNLOADS]: The skill downloads the modelscope Python package and pulls container images from the GitHub Container Registry. It also references several third-party Docker mirrors for performance optimization, which are external dependencies.
  • [PROMPT_INJECTION]: The skill establishes an indirect prompt injection surface by exposing a server on port 10086 and mounting host directories for model weights. Ingestion points include the API port and volume mounts. No boundary markers or delimiters are provided in the setup. The capability inventory includes administrative command execution and containerized subprocess spawning. No sanitization or validation of external input is specified in the installation steps.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 12, 2026, 11:37 AM