skills/mukul975/anthropic-cybersecurity-skills/analyzing-docker-container-forensics/Gen Agent Trust Hub
analyzing-docker-container-forensics
Warn
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of system-level commands to interact with the Docker daemon and manage forensic evidence.
scripts/agent.pyusessubprocess.runto execute commands such asdocker inspect,docker ps,docker diff, anddocker export.SKILL.mdprovides shell workflows involvingdocker,tar,sha256sum, andfindfor evidence processing.- [EXTERNAL_DOWNLOADS]: Fetches forensic tools from external repositories during the workflow.
- Downloads the
diveanalysis tool from its official GitHub releases. - Downloads the
container-difftool from Google's public storage APIs. - [PRIVILEGE_ESCALATION]: The workflow requires high-level permissions to perform forensic tasks.
SKILL.mdinstructs the user to usesudo dpkgto install downloaded software.- The skill requires access to the Docker socket or root-level filesystem access to analyze container artifacts.
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by processing untrusted data from compromised containers.
- Ingestion points: Reads container metadata via
docker inspect, runtime logs viadocker logs, and filesystem changes viadocker diff(documented inscripts/agent.py). - Boundary markers: Absent; the data is parsed and displayed without delimiters or warnings to the LLM to ignore instructions within the data.
- Capability inventory: Ability to execute shell commands via
subprocess.run, write files to the host system viadocker export, and perform network scans viatrivy(documented inscripts/agent.py). - Sanitization: No sanitization is performed on the content of logs or filesystem data before it is included in forensic reports or processed by the agent.
Audit Metadata