docker-pro-diagnostic
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The
log_processor.pyscript executes a shell command constructed using f-strings with unvalidated user input. - Evidence: The line
cmd = f"docker logs --tail {max_lines} {container_name}"followed bysubprocess.run(cmd, shell=True)inlog_processor.pyallows an attacker to append commands using shell metacharacters (e.g.,;,&,|,`). - Impact: An attacker can perform arbitrary actions on the host system with the privileges of the user running the agent.
- [REMOTE_CODE_EXECUTION] (HIGH): The command injection vulnerability directly leads to remote code execution capabilities on the host environment.
- [PROMPT_INJECTION] (MEDIUM): The skill is susceptible to Indirect Prompt Injection (Category 8) by processing untrusted log data.
- Ingestion points:
log_processor.pyreads raw output fromdocker logs(File:log_processor.py). - Boundary markers: Absent. The script joins raw log lines with a simple
--- CONTEXT ---string. - Capability inventory: The
SKILL.mdinstructions direct the agent to "Feed the output... into your reasoning engine" to determine root causes and suggest fixes. - Sanitization: None. The script does not sanitize or escape the content of the logs before returning them to the agent.
- Impact: Malicious content within the logs could manipulate the agent's summary or trick it into suggesting malicious "fixes" to the user.
Recommendations
- AI detected serious security threats
Audit Metadata