docker-expert
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Uses local shell commands including
docker info,docker ps,docker images, andfindto identify the environment and project structure.- [COMMAND_EXECUTION]: Performsdocker buildanddocker runon local project files to validate the functionality and security of container configurations.- [PROMPT_INJECTION]: Contains potential for indirect prompt injection as it processes local files likeDockerfileanddocker-compose.ymlwhich are untrusted. - Ingestion points: Uses
findand internal read tools to ingest contents fromDockerfileandcomposeyaml files. - Boundary markers: Does not utilize explicit boundary markers or 'ignore' instructions when reading file content.
- Capability inventory: Possesses the ability to execute
dockerandbashcommands in the host environment. - Sanitization: No validation or sanitization is performed on the content of the project files before they are processed by the agent context.
Audit Metadata