docker-production

Warn

Audited by Gen Agent Trust Hub on Feb 13, 2026

Risk Level: MEDIUMEXTERNAL_DOWNLOADS
Full Analysis

================================================================================

🟡 VERDICT: MEDIUM

This skill is generally well-structured and focuses on providing configuration and best practices for Docker deployments. The primary security concern is the reliance on an external Python library (PyYAML) within the scripts/validate.py file, which constitutes an unverifiable dependency. While PyYAML is a common and generally trusted library, any external dependency introduces a potential supply chain risk if not properly vetted. The skill also references Docker images from trusted sources, which are noted as low-risk external dependencies.

Total Findings: 2

🟡 MEDIUM Findings: • Unverifiable Dependency

  • scripts/validate.py:10: import yaml The scripts/validate.py file imports the yaml library, which is an external dependency (PyYAML) that would need to be installed. This introduces an unverifiable dependency at analysis time, as the content of this external package cannot be fully audited within the skill's provided files.

🔵 LOW Findings: • Trusted External Dependency

  • SKILL.md:100: image: prom/prometheus:latest The skill references a Docker image from prom/prometheus, which is a well-known and trusted source for Prometheus. • Trusted External Dependency
  • SKILL.md:104: image: grafana/grafana:latest The skill references a Docker image from grafana/grafana, which is a well-known and trusted source for Grafana. • Trusted External Dependency
  • SKILL.md:110: image: gcr.io/cadvisor/cadvisor:latest The skill references a Docker image from gcr.io/cadvisor/cadvisor, which is Google Container Registry, a trusted source.

================================================================================

Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 13, 2026, 02:12 AM