generate-dockerfile-iaskshahram

Pass

Audited by Gen Agent Trust Hub on Apr 13, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill performs automated validation of the generated Dockerfile by executing docker build and docker run on the local project context. This provides a mechanism for executing build logic or containerized applications defined within the project's own files.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads and analyzes untrusted codebase contents (e.g., dependency manifests, source code, and configuration files) which are then used to influence the instructions in the generated Dockerfile and the subsequent validation steps.\n
  • Ingestion points: The agent is instructed to read all project files, including manifest contents and source code, during the analysis phase in Step 1.\n
  • Boundary markers: There are no explicit delimiters or instructions to treat codebase content as potentially malicious or to ignore embedded prompts within the files being analyzed.\n
  • Capability inventory: The skill utilizes shell commands including docker build, docker run, docker logs, and docker inspect to validate the generated configuration.\n
  • Sanitization: The instructions do not specify any sanitization or validation of the content extracted from the codebase before it is used to construct Dockerfile commands or command-line arguments.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 13, 2026, 01:15 PM