docker-setup

Fail

Audited by Socket on Feb 21, 2026

1 alert found:

Malware
MalwareHIGH
SKILL.md

[Skill Scanner] Destructive bash command detected (rm -rf, chmod 777) All findings: [CRITICAL] command_injection: Destructive bash command detected (rm -rf, chmod 777) (CI004) [AITech 9.1.4] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] [HIGH] data_exfiltration: Credential file access detected (DE002) [AITech 8.2.3] This skill is coherent with its stated purpose and contains typical patterns for Dockerizing a multi-service application. I found no signs of obfuscated or explicitly malicious code, no curl|bash download-and-execute instructions, and no hidden exfiltration points. The primary risks are normal supply-chain risks from third-party packages (PyPI/npm), and accidental credential exposure if .env or secrets are committed or if the user forwards secret-containing Dockerfiles to external services. The optional Docker AI/Gordon feature can transmit Dockerfile or image data to Docker’s service — this is documented and should be considered a user-authorized third-party data flow. Operational issues (a COPY path typo and missing curl in images) are present but non-malicious. LLM verification: This skill is documentation/templates to set up Docker images and docker-compose for a three-service Todo app and is functionally consistent with its stated purpose. It does not contain direct malicious code or obfuscated payloads. However, there are moderate supply-chain and data-exposure risks: unpinned pip/npm dependencies in Dockerfiles, installation of third-party packages in runtime images, and forwarding of sensitive environment variables into containers (which could be accessed by any pa

Confidence: 95%Severity: 90%
Audit Metadata
Analyzed At
Feb 21, 2026, 12:27 PM
Package URL
pkg:socket/skills-sh/maneeshanif%2Ftodo-spec-driven%2Fdocker-setup%2F@034f91edfc0b4ba67ff95419be0cbbfb2e51be72