docker-registry
Audited by Gen Agent Trust Hub on Feb 13, 2026
================================================================================
š“ VERDICT: HIGH
The skill is rated HIGH due to the scripts/registry-setup.sh file containing commands that perform system-level package installation (apt-get install). This action requires elevated privileges (e.g., root or sudo), which constitutes a privilege escalation risk. While the script itself does not contain sudo, it implicitly expects to be run with such privileges to succeed, leading to system modification. Other findings are of lower severity but are noted for awareness.
Total Findings: 5
š“ HIGH Findings: ⢠Privilege Escalation (System Package Installation)
- scripts/registry-setup.sh:29:
apt-get update && apt-get install -y apache2-utils - This command attempts to install system packages, requiring root privileges. Running this script with
sudowould grant it the ability to modify the system, which is a significant security concern.
šµ LOW Findings: ⢠Credential Handling (Sensitive Token Usage)
- SKILL.md:69:
echo $GITHUB_TOKEN | docker login ghcr.io -u USERNAME --password-stdin - The skill demonstrates passing sensitive tokens (like
GITHUB_TOKENand AWS ECR passwords) todocker loginvia stdin. While this is a common and generally safer practice than passing them directly as command-line arguments, it still involves handling sensitive credentials within the execution environment. ⢠External Dependency (CLI Tools) - SKILL.md:144:
skopeo copy - The skill references
skopeofor multi-registry sync without providing installation instructions. This is an external tool that the skill relies on, making it an unverifiable dependency in the context of the skill's direct distribution. ⢠Permissive Security Configuration (CORS) - assets/docker-compose-registry.yaml:15:
REGISTRY_HTTP_HEADERS_Access-Control-Allow-Origin: '["*"]' - The Docker Compose file configures the registry to allow Cross-Origin Resource Sharing (CORS) from any origin. While potentially acceptable for local development, this is a permissive setting that could expose the registry to cross-site attacks if not properly secured in a production environment. ⢠Documentation Best Practice (Plaintext Password Example)
- references/REGISTRY-GUIDE.md:30:
htpasswd -Bbn admin password123 - The documentation provides an example command that includes a literal plaintext password (
password123). While an example, this is a poor security practice as users might copy-paste it or be encouraged to use weak passwords.
================================================================================
- AI detected serious security threats