Docker Skill

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a coherent Docker help skill, with expected but powerful Docker installation and container-management commands that users should run deliberately.

This skill appears safe to install as documentation-only Docker guidance. Before following its commands, be careful with sudo installation steps, downloaded installer scripts, docker group membership, port publishing, bind mounts, and cleanup commands such as prune.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

66/66 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running this command could make system-level changes as root.

Why it was flagged

The skill documents downloading and running an installation script with sudo. This is disclosed, official-Docker-oriented, and marked dev/test only, but it is still a privileged code-execution path users should treat carefully.

Skill content
Convenience script (dev/test only): `curl -fsSL https://get.docker.com -o get-docker.sh && sudo sh get-docker.sh`. Not recommended for production.
Recommendation

Prefer the official Docker documentation and package-manager install steps; only run the convenience script if you understand and trust it for your environment.

What this means

A user added to the docker group may be able to perform powerful host-level actions through Docker.

Why it was flagged

Adding a user to the docker group is a persistent privilege change. It is relevant to Docker use, but it can grant broad control over the host through Docker.

Skill content
Optional (run without sudo): [Linux postinstall] — add user to `docker` group.
Recommendation

Only add trusted users to the docker group, and understand the security implications before making this persistent change.

What this means

Running cleanup commands may remove images, containers, networks, or other Docker state that the user expected to keep.

Why it was flagged

The skill includes a Docker cleanup command that can remove local Docker resources. It is accurately described and cautioned, but users should review before running it.

Skill content
`docker system prune -a` (removes unused images/containers/networks; use with care).
Recommendation

Review what Docker will remove before using prune commands, especially on shared or production machines.