docker-expert
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill executes shell and Docker commands to analyze the environment and validate project configurations.
- Environment detection is performed via
docker version,docker info, anddocker context ls. - File discovery utilizes
findto locate Dockerfiles and Compose configurations. - Validation steps involve executing
docker build,docker run, anddocker-compose configon local files. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection from the Docker-related files it processes.
- Ingestion points: The skill reads local files like
Dockerfileanddocker-compose.ymlidentified by thefindcommand inSKILL.md. - Boundary markers: No specific delimiters or safety instructions are used to separate untrusted file content from the agent's instructions during analysis.
- Capability inventory: The agent has the ability to execute shell commands, build images, and run containers based on the analyzed file content.
- Sanitization: There is no evidence of content filtering or sanitization before the agent processes the file contents.
- [EXTERNAL_DOWNLOADS]: The skill references base images from well-known registries for its optimization examples.
- Examples reference
node:18-alpinefrom Docker Hub andgcr.io/distroless/nodejs18-debian11from Google Container Registry. - These references are used for demonstrating best practices in multi-stage builds and image hardening.
Audit Metadata