docker-to-sealos
Warn
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill script
scripts/compose_to_template.pycontains logic to resolve Docker Compose environment variables usingos.environ.get(). This allows a malicious input file to reference and extract sensitive environment variables from the agent's own runtime environment, potentially leaking them into the generatedindex.yamloutput. - Evidence: Functions
_resolve_compose_variable_expressionandresolve_compose_valueinscripts/compose_to_template.pyfacilitate this behavior. - [COMMAND_EXECUTION]: The skill executes external system binaries and internal scripts using
subprocess.runto perform its conversion and validation tasks. - Evidence:
scripts/compose_to_template.pyexecutescraneandkomposebinaries found in the system PATH. - Evidence:
scripts/quality_gate.pyorchestrates the execution of several internal Python validation scripts. - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface as it ingests and processes untrusted Docker Compose YAML files provided by users.
- Ingestion points:
scripts/compose_to_template.pyreads user-provided Docker Compose YAML files. - Boundary markers: Absent.
- Capability inventory: Writing output templates (
index.yaml) and executing subprocesses (crane,kompose). - Sanitization: Employs
yaml.safe_loadand regex-based naming normalization.
Audit Metadata