Docker Skill
Security checks across static analysis, malware telemetry, and agentic risk
Overview
This is a coherent Docker help skill, with expected but powerful Docker installation and container-management commands that users should run deliberately.
This skill appears safe to install as documentation-only Docker guidance. Before following its commands, be careful with sudo installation steps, downloaded installer scripts, docker group membership, port publishing, bind mounts, and cleanup commands such as prune.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
66/66 vendors flagged this skill as clean.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Running this command could make system-level changes as root.
The skill documents downloading and running an installation script with sudo. This is disclosed, official-Docker-oriented, and marked dev/test only, but it is still a privileged code-execution path users should treat carefully.
Convenience script (dev/test only): `curl -fsSL https://get.docker.com -o get-docker.sh && sudo sh get-docker.sh`. Not recommended for production.
Prefer the official Docker documentation and package-manager install steps; only run the convenience script if you understand and trust it for your environment.
A user added to the docker group may be able to perform powerful host-level actions through Docker.
Adding a user to the docker group is a persistent privilege change. It is relevant to Docker use, but it can grant broad control over the host through Docker.
Optional (run without sudo): [Linux postinstall] — add user to `docker` group.
Only add trusted users to the docker group, and understand the security implications before making this persistent change.
Running cleanup commands may remove images, containers, networks, or other Docker state that the user expected to keep.
The skill includes a Docker cleanup command that can remove local Docker resources. It is accurately described and cautioned, but users should review before running it.
`docker system prune -a` (removes unused images/containers/networks; use with care).
Review what Docker will remove before using prune commands, especially on shared or production machines.
