docker-troubleshoot
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- PROMPT_INJECTION (HIGH): Vulnerable to Indirect Prompt Injection. 1. Ingestion points: The skill reads untrusted data from
docker compose logs,docker inspect, and container file systems. 2. Boundary markers: None present to distinguish instructions from data. 3. Capability inventory: High-impact actions includingdocker compose exec -u root,docker system prune, andkill. 4. Sanitization: None present. An attacker-controlled container could output malicious instructions in logs to hijack the agent and execute destructive host or container commands. - COMMAND_EXECUTION (HIGH): The skill allows the agent to execute arbitrary commands as root inside containers via
docker compose exec -u root app. This level of access enables total control over the container environment and potential exploitation of container vulnerabilities. - DATA_EXFILTRATION (MEDIUM): Multiple commands such as
docker compose logs,docker compose config, anddocker inspectare used to retrieve information. These outputs frequently contain sensitive secrets, API keys, and database credentials which would be exposed to the agent and potentially exfiltrated. - COMMAND_EXECUTION (MEDIUM): Provides access to destructive commands like
kill $(lsof -t -i:3000)anddocker system prune -a --volumes. If manipulated or used incorrectly, these could lead to immediate denial of service or permanent data loss.
Recommendations
- AI detected serious security threats
Audit Metadata