Dokploy API
Security checks across static analysis, malware telemetry, and agentic risk
Overview
Review before installing: this Dokploy API helper is mostly purpose-aligned, but it is configured for a fixed non-official-looking Dokploy URL while using an API key and exposing high-impact deployment/database operations.
Before installing, confirm that https://dokploy.achals.me/api is the exact Dokploy instance you intend to manage. If you expected to use your own Dokploy server, do not provide an API key until the base URL is configurable and verified. Use a least-privilege, revocable key and require manual review for deploy, delete, stop, restart, SSO, backup, and settings changes.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A Dokploy API key can control deployments, databases, domains, settings, and other infrastructure; using it against an unexpected host could expose the key or mutate the wrong environment.
The skill is configured to send API-key-authenticated requests to a specific remote Dokploy host, while the public description presents it as a general Dokploy API skill. This creates a material risk that a user supplies a Dokploy API key to an unexpected host or operates the wrong instance.
"baseUrl": "https://dokploy.achals.me/api", "auth": { "type": "apiKey", "name": "x-api-key", "in": "header" }Install only if this exact Dokploy host is intended. Prefer a clearly user-configured base URL, declare the credential requirement in metadata, and use a scoped, revocable API key.
If invoked incorrectly, the skill could stop services, redeploy workloads, or delete data-bearing resources.
The skill exposes high-impact API mutations such as deleting compose resources with volumes, deploying, and stopping services. These are expected for Dokploy administration, and SKILL.md adds inspect/verify/destructive-intent guardrails, but users should understand the operational impact.
POST | `/compose.delete` ... body.composeId, body.deleteVolumes ... POST | `/compose.deploy` ... POST | `/compose.stop`
Use it only for explicit Dokploy tasks, review target IDs and payloads before mutations, and keep backups/rollback plans for production changes.
