docker-containerization
Warn
Audited by Gen Agent Trust Hub on Feb 23, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The scripts
scripts/docker-build.shandscripts/docker-run.shutilizeeval $DOCKER_CMDto execute dynamically constructed command strings. Although the variables are partially validated during argument parsing, the use ofevalre-evaluates the entire string, which can lead to shell injection if a user-supplied variable (like an image name or tag) contains malicious shell characters (e.g.,;,&,|). - INDIRECT_PROMPT_INJECTION (LOW): This skill has an attack surface for indirect prompt injection because it generates executable shell scripts based on user input (e.g., image names, repository paths).
- Ingestion points: User input provided to the agent for generating containerization configurations.
- Boundary markers: None. The templates directly interpolate provided names into shell commands.
- Capability inventory: Subprocess execution via
evalanddockercommands inscripts/docker-build.sh,scripts/docker-run.sh, andscripts/docker-push.sh. - Sanitization: The scripts use basic variable quoting, but this is bypassed by the subsequent call to
eval. - DATA_EXFILTRATION (SAFE): No indicators were found of the skill attempting to access sensitive files (like
~/.sshor.envfiles on the host) and transmitting them to external domains. - REMOTE_CODE_EXECUTION (SAFE): No patterns were detected involving the download and immediate execution of remote scripts (e.g.,
curl | bash).
Audit Metadata