dockerfile-optimizer

skills-sh:patricio0312rev_skills__dockerfile-optimizer

View source
B
84/100

First Seen

Feb 18, 2026

Last Scanned

Feb 20, 2026

Findings

9

Score

84/100

MEDIUM 2
LOW 7

Findings (9)

MEDIUM
Conditional CI execution
L520

Detects conditional execution based on CI environment variables combined with dangerous commands

${{ secrets.GITHUB_TOKEN + node -e
FIX

Pin all dependencies to exact versions with integrity hashes. Use lock files (package-lock.json, poetry.lock) and enable checksum verification in your package manager.

FP?

Likely FP if the match is documentation about dependency management best practices rather than actual unpinned dependency declarations.

MEDIUM
Docker socket access
L589

Detects attempts to access the Docker daemon socket

/var/run/docker.sock
FIX

Block access to cloud provider IAM and credential endpoints from agent tools. Implement egress filtering to prevent requests to cloud control plane APIs.

FP?

Likely FP if the match is documentation about cloud IAM setup rather than code that programmatically accesses IAM endpoints.

LOW
Runtime URL controlling behavior
L154

Detects URLs fetched at runtime that control or influence agent behavior without pinning

get --no-verbose --tries=1 --spider http:// + instructions
FIX

Avoid loading configuration or behavior-controlling content from runtime URLs. Bundle required configurations locally or pin remote config to versioned, integrity-verified endpoints.

FP?

Likely FP if the URL in the match is a documentation link or example URL (e.g., example.com) rather than an actual runtime-fetched configuration endpoint.

LOW
System package manager install
L339

Detects system-level package installation via brew, apt, yum, or dnf

apt-get install -y c
FIX

Pin system packages to specific versions where the package manager supports it. Document the exact packages required and prefer containerized environments to avoid system-wide changes.

FP?

Likely FP if the match is standard setup documentation listing well-known system packages (e.g., apt install git curl) that are prerequisites.

LOW
System package manager install
L350

Detects system-level package installation via brew, apt, yum, or dnf

apt-get install -y p
FIX

Pin system packages to specific versions where the package manager supports it. Document the exact packages required and prefer containerized environments to avoid system-wide changes.

FP?

Likely FP if the match is standard setup documentation listing well-known system packages (e.g., apt install git curl) that are prerequisites.

LOW
Unpinned GitHub Actions
L534

Detects GitHub Actions references using mutable branch names instead of pinned commit SHAs or tags

uses: aquasecurity/trivy-action@master
FIX

Verify that build scripts and Makefiles do not download or run code from untrusted sources. Audit all build steps and pin any external tools used during the build process.

FP?

Likely FP if the build script only runs standard toolchain commands (e.g., cargo build, go build) without downloading external resources.

LOW
System package manager install
L570

Detects system-level package installation via brew, apt, yum, or dnf

apt-get install -y p
FIX

Pin system packages to specific versions where the package manager supports it. Document the exact packages required and prefer containerized environments to avoid system-wide changes.

FP?

Likely FP if the match is standard setup documentation listing well-known system packages (e.g., apt install git curl) that are prerequisites.

LOW
System package manager install
L575

Detects system-level package installation via brew, apt, yum, or dnf

apt-get install -y p
FIX

Pin system packages to specific versions where the package manager supports it. Document the exact packages required and prefer containerized environments to avoid system-wide changes.

FP?

Likely FP if the match is standard setup documentation listing well-known system packages (e.g., apt install git curl) that are prerequisites.

LOW
System package manager install
L576

Detects system-level package installation via brew, apt, yum, or dnf

apt-get install -y p
FIX

Pin system packages to specific versions where the package manager supports it. Document the exact packages required and prefer containerized environments to avoid system-wide changes.

FP?

Likely FP if the match is standard setup documentation listing well-known system packages (e.g., apt install git curl) that are prerequisites.