ln-731-docker-generator
Pass
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches template files from the author's GitHub repository (github.com/levnikolaevich/claude-code-skills) when local files are unavailable. This is a vendor-owned resource used for legitimate skill functionality.
- [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection by ingesting untrusted local data from the project being containerized.
- Ingestion points: Local project files including package.json, *.csproj, pyproject.toml, and requirements.txt.
- Boundary markers: None explicitly defined in the data reading phase.
- Capability inventory: Creation of persistent configuration files (Dockerfile, docker-compose.yml, nginx.conf) on the filesystem.
- Sanitization: Includes basic validation of stack types and version formats before processing.
- [SAFE]: The generated configuration files adhere to security best practices, such as running containers as non-root users and pinning image versions to specific tags.
- [SAFE]: Includes a robust .dockerignore template designed to prevent the accidental inclusion of sensitive files like .env and private keys in Docker build contexts.
Audit Metadata