dockerfile-optimise

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • [PROMPT_INJECTION] (LOW): Indirect Prompt Injection (Category 8) vulnerability surface detected.
  • Ingestion points: The skill is designed to process user-provided Dockerfiles for review and refactoring tasks as specified in the trigger conditions in SKILL.md.
  • Boundary markers: There are no defined delimiters or instructions to ignore embedded prompts within the analyzed Dockerfile content.
  • Capability inventory: The agent has the capability to generate and modify complex Dockerfiles containing shell scripts and system configurations (SKILL.md).
  • Sanitization: No sanitization or validation of external Dockerfile content is performed before processing.
  • [EXTERNAL_DOWNLOADS] (LOW): Documentation includes examples of using curl and wget to download scripts and tools (e.g., in references/lint-pipefail.md and references/inst-copy-over-add.md). These examples use placeholder domains (example.com) or well-known third-party sources (nodesource.com) for educational purposes.
  • [COMMAND_EXECUTION] (LOW): Numerous examples of shell commands like apt-get, pip, and npm are present in the reference files. These are intended for use in Dockerfile construction and are not executed by the skill itself.
  • [CREDENTIALS_UNSAFE] (SAFE): Documentation includes dummy secret strings (e.g., 'sk-live-abc123' in references/sec-secret-mounts.md) to demonstrate how to properly manage sensitive data. No real credentials or private keys were found.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:17 PM