docker
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- REMOTE_CODE_EXECUTION (LOW): The automated scan detected a remote code execution pattern: 'curl -fsSL https://get.docker.com -o get-docker.sh'. While downloading and executing remote scripts is typically a high-risk activity, the source 'get.docker.com' belongs to the 'docker' organization, which is a verified and trusted entity according to the security framework. Under the [TRUST-SCOPE-RULE], findings involving trusted sources are downgraded to LOW severity. No other malicious patterns such as credential theft or prompt injection were detected in the provided README.md.
Recommendations
- HIGH: Downloads and executes remote code from: https://get.docker.com - DO NOT USE without thorough review
Audit Metadata