remote-docker-nas

Warn

Audited by Snyk on Feb 23, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.80). Yes — the skill fetches and runs remote container images at runtime (e.g., "crane pull freshrss/freshrss:latest" which resolves to the Docker Hub entry https://hub.docker.com/r/freshrss/freshrss and similarly jc21/nginx-proxy-manager:latest), so externally hosted code is downloaded, loaded, and executed on the NAS and is required for the workflow.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 0.80). The prompt explicitly instructs system-level changes (e.g., running sudo usermod -aG docker <nas-user>, editing shell profiles, loading images and starting services on the host) which require elevated privileges and modify the machine's state, so it should be flagged.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 23, 2026, 03:32 AM