configure-dockerfile

Pass

Audited by Gen Agent Trust Hub on Mar 5, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: Executes find and grep commands to identify Dockerfiles and determine project types by scanning local manifest files.\n- [EXTERNAL_DOWNLOADS]: Fetches base image version information from Docker Hub using WebSearch and WebFetch to verify that the project is using up-to-date images.\n- [PROMPT_INJECTION]: Contains an indirect prompt injection surface as it processes untrusted local project files and web search results.\n
  • Ingestion points: Project configuration files (e.g., package.json, pyproject.toml) and web data from Docker Hub.\n
  • Boundary markers: None; there are no delimiters or instructions to ignore instructions embedded in data.\n
  • Capability inventory: Includes file writing/editing (Write, Edit), directory traversal (Glob), and local utility execution (find, grep).\n
  • Sanitization: None; the skill does not validate or escape content retrieved from the local environment or the web.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 5, 2026, 12:49 PM