devops
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (LOW): Detected remote code execution via piped shell command.
- Evidence: 'curl -fsSL https://get.docker.com | sh'.
- Analysis: Under Category 4, piped remote execution is typically CRITICAL. However, 'docker' is a Trusted Organization. Per [TRUST-SCOPE-RULE], network operations targeting trusted sources are downgraded to LOW.
- [SAFE] (SAFE): False positive malicious URL detection.
- Evidence: Scanner flagged 'logger.info'.
- Analysis: 'logger.info' is a standard software development logging call, not a malicious web domain. This is a false positive and poses no threat.
Recommendations
- HIGH: Downloads and executes remote code from: https://get.docker.com - DO NOT USE without thorough review
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata