skills/mukul975/anthropic-cybersecurity-skills/scanning-containers-with-trivy-in-cicd/Gen Agent Trust Hub
scanning-containers-with-trivy-in-cicd
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The scripts
scripts/agent.pyandscripts/process.pyexecute thetrivycommand-line utility to perform container and configuration scans. These scripts correctly usesubprocess.run()with a list of arguments rather than a single shell string, effectively mitigating the risk of shell injection. - [EXTERNAL_DOWNLOADS]: The skill documentation and CI/CD templates reference official GitHub Actions (
aquasecurity/trivy-action) and Docker images (aquasec/trivy) provided by Aqua Security. These are well-known and trusted sources within the DevSecOps ecosystem. - [DATA_EXPOSURE]: The Dockerfile template in
assets/template.mdincludes a standard health check instruction using Python'surllib.request. This operation is restricted tolocalhostand is a routine practice for container health monitoring, posing no risk of external data exfiltration. - [REMOTE_CODE_EXECUTION]: While the skill involves executing the Trivy binary, the execution is scoped to the tool's intended purpose. The scripts do not download or execute arbitrary code from untrusted remote sources.
Audit Metadata