container-debug

clawhub:container-debug

View source
A
92/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

5

Score

92/100

MEDIUM 1
LOW 4

Findings (5)

MEDIUM
Sensitive file read pattern
L165

Detects reads of sensitive system or credential files

cat /etc/hosts
FIX

Prevent the tool from reading environment variables and sending them to external endpoints. If env access is needed, restrict it to specific variable names via an allowlist.

FP?

Likely FP if the match is documentation about how to configure environment variables, not code that reads and transmits them.

LOW
Runtime URL controlling behavior
L169

Detects URLs fetched at runtime that control or influence agent behavior without pinning

get -qO- http:// + Config
FIX

Avoid loading configuration or behavior-controlling content from runtime URLs. Bundle required configurations locally or pin remote config to versioned, integrity-verified endpoints.

FP?

Likely FP if the URL in the match is a documentation link or example URL (e.g., example.com) rather than an actual runtime-fetched configuration endpoint.

LOW
Conditional download and install
L171

Detects patterns that check for tool existence and install if missing

If curl/ping not available in container, install
FIX

Replace conditional download-and-install logic with explicit dependency declarations in a manifest file (package.json, requirements.txt). Verify checksums for any runtime downloads.

FP?

Likely FP if the conditional install is documentation showing standard prerequisite checks (e.g., checking if a tool is installed before installing it).

LOW
Docker pull and run untrusted image
L206

Detects pulling and running Docker images from external registries

docker run --rm --net=container:my-container nicolaka/n
FIX

Pin Docker images to a specific digest (e.g., image@sha256:abc...) instead of using mutable tags like :latest. Use trusted base images from verified publishers.

FP?

Likely FP if the Docker command pulls a well-known official image (e.g., docker pull python:3.11) in setup documentation.

LOW
Docker pull and run untrusted image
L209

Detects pulling and running Docker images from external registries

docker run --rm --net=container:my-container nicolaka/n
FIX

Pin Docker images to a specific digest (e.g., image@sha256:abc...) instead of using mutable tags like :latest. Use trusted base images from verified publishers.

FP?

Likely FP if the Docker command pulls a well-known official image (e.g., docker pull python:3.11) in setup documentation.