CloverSec-CTF-Build-Dockerizer

Warn

Audited by Socket on Mar 18, 2026

1 alert found:

Anomaly
AnomalyLOW
examples/secops-nginx-hardening-basic/start.sh

The script is a container entrypoint intended for CTF/SecOps deployment: it ensures a readable /flag and starts sshd and ttyd to provide remote shell access, then runs nginx. I find no obfuscated or directly malicious code (no backdoor/exfiltration routines), but it contains insecure defaults (hardcoded weak ttyd password) and intentionally exposes interactive shells which is a significant security risk if the container is network-accessible. Use only in controlled/trusted CTF environments; do not use in production without securing or removing sshd/ttyd and replacing hardcoded credentials.

Confidence: 90%Severity: 60%
Audit Metadata
Analyzed At
Mar 18, 2026, 10:14 PM
Package URL
pkg:socket/skills-sh/d1a0y1bb%2Fcloversec-ctf-build-dockerizer-skill%2Fcloversec-ctf-build-dockerizer%2F@fff2ccaaa4e25107b42fbb05b70bb3cebb750e37