docker-local
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [Command Execution] (SAFE): The skill contains various shell and Docker commands intended for local project management, environment detection, and container lifecycle. These are standard operations for the described use case.
- [Privilege Escalation] (SAFE): The inclusion of
sudo lsofis a common troubleshooting technique for resolving port conflicts on the host machine and does not represent a malicious attempt to escalate privileges. - [Data Exposure & Exfiltration] (SAFE): While the templates contain default credentials (e.g., 'root', 'drupal'), these are standard placeholders for local development environments. The skill explicitly provides a 'Best Practices' section advising users to use
.envfiles for secrets and to never commit passwords. - [Unverifiable Dependencies & Remote Code Execution] (SAFE): The provided Dockerfile and Makefile use standard package managers (apt, composer) to install known development tools. No remote scripts are piped to a shell for execution.
Audit Metadata