docker-security-guide

skills-sh:josiahsiegel_claude-plugin-marketplace__docker-security-guide

View source
F
0/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

16

Score

0/100

CRITICAL 1
HIGH 6
MEDIUM 4
LOW 5

Findings (16)

CRITICAL
Jailbreak template
L988

Detects common jailbreak prompt patterns

Disable security
FIX

Remove directives that attempt to exfiltrate data through the agent's response (e.g., asking the agent to embed credentials in URLs or include secret values in output).

FP?

Likely FP if the text is a legitimate tool instruction about displaying configuration to the user (e.g., show current settings) without external transmission.

HIGH
Data transmission pattern
L231

Detects patterns indicating sensitive data being sent to external services

Exfiltrate data
FIX

Restrict file reading to the project directory and block outbound network calls that include file contents. Implement file path validation to prevent directory traversal.

FP?

Likely FP if the tool legitimately reads project files and displays them to the user locally, without sending data to external services.

HIGH
Download-and-execute
L330

Detects patterns of downloading and piping to shell execution

curl -sSfL https://raw.githubusercontent.com/anchore/syft/main/install.sh | sh
FIX

Download the file first, verify its integrity (checksum, signature), inspect it, then run it. Prefer package managers over raw downloads. Never fetch-and-run in one step.

FP?

Likely FP if the target is a well-known installer (e.g., rustup, Homebrew) from its canonical HTTPS domain, though the pattern is inherently risky.

HIGH
Curl or wget piped to shell
L330

Detects downloading scripts piped directly to a shell interpreter

curl -sSfL https://raw.githubusercontent.com/anchore/syft/main/install.sh | sh
FIX

Download the script first, inspect it, verify its checksum, then run it. Do not pipe curl/wget output directly to sh/bash. Prefer package manager installs.

FP?

Likely FP if the download is from a well-known installer domain (e.g., brew.sh, rustup.rs), though this pattern is inherently risky even with trusted sources.

HIGH
Privilege escalation
L520

Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands

SETGID
FIX

Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.

FP?

Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.

HIGH
Privilege escalation
L578

Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands

setuid
FIX

Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.

FP?

Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.

HIGH
Docker socket access
L983

Detects attempts to access the Docker daemon socket

/var/run/docker.sock
FIX

Block access to cloud provider IAM and credential endpoints from agent tools. Implement egress filtering to prevent requests to cloud control plane APIs.

FP?

Likely FP if the match is documentation about cloud IAM setup rather than code that programmatically accesses IAM endpoints.

MEDIUM
Runtime URL controls agent behavior
L330

Detects skills fetching external URLs to use as runtime instructions

curl -sSfL https://raw.githubusercontent.com + guidelines
FIX

Pin the downloaded resource to a specific version or commit hash, and verify its integrity with a checksum (SHA-256). Avoid fetching scripts or binaries from arbitrary URLs at runtime.

FP?

Likely FP if the download URL points to a well-known CDN or package registry (e.g., npmjs.com, pypi.org) and is pinned to a specific version.

MEDIUM
Privilege escalation
L789

Detects privilege escalation patterns like setuid, chown root, or sudo with shell commands

sudo sh
FIX

Avoid depending on packages that could be subject to typosquatting or name confusion. Verify package ownership, check download counts, and audit the package source before adding dependencies.

FP?

Likely FP if the flagged package is a well-known, high-download-count package from a verified publisher.

MEDIUM
Docker socket access
L795

Detects attempts to access the Docker daemon socket

/var/run/docker.sock
FIX

Block access to cloud provider IAM and credential endpoints from agent tools. Implement egress filtering to prevent requests to cloud control plane APIs.

FP?

Likely FP if the match is documentation about cloud IAM setup rather than code that programmatically accesses IAM endpoints.

MEDIUM
Docker socket access
L881

Detects attempts to access the Docker daemon socket

/var/run/docker.sock
FIX

Block access to cloud provider IAM and credential endpoints from agent tools. Implement egress filtering to prevent requests to cloud control plane APIs.

FP?

Likely FP if the match is documentation about cloud IAM setup rather than code that programmatically accesses IAM endpoints.

LOW
Docker pull and run untrusted image
L86

Detects pulling and running Docker images from external registries

docker pull node
FIX

Pin Docker images to a specific digest (e.g., image@sha256:abc...) instead of using mutable tags like :latest. Use trusted base images from verified publishers.

FP?

Likely FP if the Docker command pulls a well-known official image (e.g., docker pull python:3.11) in setup documentation.

LOW
Mutable GitHub raw content reference
L330

Detects references to raw.githubusercontent.com on mutable branches like main/master

raw.githubusercontent.com/anchore/syft/main/
FIX

Replace GitHub raw.githubusercontent.com references with pinned commit SHAs instead of branch names (e.g., /commit-sha/file instead of /main/file). Branch references are mutable.

FP?

Likely FP if the raw GitHub URL points to a versioned release tag in a well-known repository, though even tags are technically mutable.

LOW
Chained shell command execution
L330

Detects chained commands using shell operators with dangerous operations

curl -sSfL https://raw.githubusercontent.com/anchore/syft/main/install.sh | sh
FIX

Break chained commands into discrete, individually validated steps. Avoid piping untrusted output directly into a shell interpreter.

FP?

Likely FP if the matched text is a documentation example showing a common installer one-liner for a well-known tool with a canonical URL.

LOW
Docker pull and run untrusted image
L486

Detects pulling and running Docker images from external registries

docker pull my-image
FIX

Pin Docker images to a specific digest (e.g., image@sha256:abc...) instead of using mutable tags like :latest. Use trusted base images from verified publishers.

FP?

Likely FP if the Docker command pulls a well-known official image (e.g., docker pull python:3.11) in setup documentation.

LOW
Shell script file execution
L789

Detects execution of shell script files via bash/sh command or direct invocation

sh docker-bench-security.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.