skills/mukul975/anthropic-cybersecurity-skills/analyzing-docker-container-forensics/Gen Agent Trust Hub
analyzing-docker-container-forensics
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/agent.pyscript executes multiple Docker commands such asdocker inspect,docker diff, anddocker logsusingsubprocess.runwithshell=True. Thecontainer_idvariable, sourced directly from command-line arguments, is interpolated into these command strings without validation or escaping. This vulnerability allows a maliciously crafted container ID to execute arbitrary commands on the host system. - [EXTERNAL_DOWNLOADS]: The
SKILL.mdfile contains instructions to download and install external forensic tools from remote repositories. Specifically, it fetches thedivetool from GitHub releases andcontainer-difffrom Google Storage APIs. These are recognized as well-known and trusted sources. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it processes untrusted data from Docker container logs and inspection metadata.
- Ingestion points: Container metadata via
docker inspect, filesystem changes viadocker diff, and application logs viadocker logsinscripts/agent.py. - Boundary markers: None identified. The script processes and prints raw output from Docker commands.
- Capability inventory: The script has the capability to execute shell commands via
subprocess.runinscripts/agent.py. - Sanitization: No sanitization or escaping is performed on the data ingested from Docker commands before it is processed or used in the CLI output.
Audit Metadata