AGENT LAB: SKILLS

docker-compose-orchestration

Warn

Audited by Socket on Feb 15, 2026

1 alert found:

Anomaly
AnomalyLOW
EXAMPLES.md

This file is a non-obfuscated examples document describing many common Docker Compose setups. It does not contain direct malware or obfuscated payloads, but it contains numerous insecure defaults and risky patterns (hard-coded credentials, exposed management UIs, host filesystem mounts, privileged containers, and Docker socket mounts). If reused unchanged in production, these configurations could enable credential theft, unauthorized access to management consoles, privilege escalation to the host via the Docker socket, and execution of arbitrary code via mounted init scripts. Recommendation: treat this as insecure-by-default documentation — do not copy secrets or mounts verbatim into production. Replace default credentials, restrict UI exposure (use firewall/VPN), remove Docker socket or restrict runner access, avoid privileged containers and full / mounts, and review any mounted init scripts.

Confidence: 90%Severity: 60%
Audit Metadata
Analyzed At
Feb 15, 2026, 08:02 PM
Package URL
pkg:socket/skills-sh/manutej%2Fluxor-claude-marketplace%2Fdocker-compose-orchestration%2F@065096b5fb395b630c516d3de184ea06f669c6f4