CloverSec-CTF-Build-Dockerizer
Warn
Audited by Socket on Mar 18, 2026
1 alert found:
AnomalyAnomalyexamples/secops-nginx-hardening-basic/start.sh
LOWAnomalyLOW
examples/secops-nginx-hardening-basic/start.sh
The script is a container entrypoint intended for CTF/SecOps deployment: it ensures a readable /flag and starts sshd and ttyd to provide remote shell access, then runs nginx. I find no obfuscated or directly malicious code (no backdoor/exfiltration routines), but it contains insecure defaults (hardcoded weak ttyd password) and intentionally exposes interactive shells which is a significant security risk if the container is network-accessible. Use only in controlled/trusted CTF environments; do not use in production without securing or removing sshd/ttyd and replacing hardcoded credentials.
Confidence: 90%Severity: 60%
Audit Metadata