remote-docker-nas
Warn
Audited by Snyk on Feb 23, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.80). Yes — the skill fetches and runs remote container images at runtime (e.g., "crane pull freshrss/freshrss:latest" which resolves to the Docker Hub entry https://hub.docker.com/r/freshrss/freshrss and similarly jc21/nginx-proxy-manager:latest), so externally hosted code is downloaded, loaded, and executed on the NAS and is required for the workflow.
MEDIUM W013: Attempt to modify system services in skill instructions.
- Attempt to modify system services in skill instructions detected (high risk: 0.80). The prompt explicitly instructs system-level changes (e.g., running
sudo usermod -aG docker <nas-user>, editing shell profiles, loading images and starting services on the host) which require elevated privileges and modify the machine's state, so it should be flagged.
Audit Metadata