Docker Socket Proxy

Security checks across static analysis, malware telemetry, and agentic risk

Overview

No hidden or malicious behavior is evident, but this is a powerful Docker administration skill that should only be used with a tightly scoped docker-socket-proxy.

Install this only if you have a docker-socket-proxy configured. Point DOCKER_PROXY_URL or DOCKER_HOST at the proxy, not a raw Docker daemon, and enable only the API sections you actually need. Avoid enabling exec or prune unless necessary, and confirm disruptive actions before running them.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the proxy allows these endpoints, the agent could disrupt running workloads or delete unused Docker resources.

Why it was flagged

The skill exposes mutating and potentially destructive Docker operations. They are disclosed and aligned with the Docker-management purpose, but they need careful user/proxy scoping.

Skill content
`start`, `stop`, `restart`, `kill`, `pause`, `unpause`, `rename`, `exec`, `prune-containers` ... `prune-volumes`
Recommendation

Enable only the docker-socket-proxy sections you need and require explicit approval for exec, kill, restart, and prune operations.

What this means

Pointing this skill at a raw Docker daemon or overly permissive proxy could give the agent broad control over containers and potentially the host.

Why it was flagged

The artifacts acknowledge Docker API access can be host-root-equivalent and the helper relies on the configured endpoint being the intended proxy.

Skill content
Exposing the raw Docker socket to an agent is equivalent to giving it root access to the host ... If neither is set, defaults to `http://localhost:2375`.
Recommendation

Do not expose the raw Docker daemon to this skill. Use docker-socket-proxy on a private network and enable only the minimum API sections needed.

What this means

Commands run through exec could change container state or read data available inside the container.

Why it was flagged

The skill includes a documented Docker exec mode, which can run commands inside containers. This is purpose-aligned but inherently powerful.

Skill content
`exec <name> <cmd> [args...]` | Run command in container
Recommendation

Disable Docker exec at the proxy unless needed, and require user confirmation before running commands inside containers.

What this means

Secrets or misleading instructions in logs/env output could be exposed to the conversation or over-trusted by the agent.

Why it was flagged

The helper can place container environment variables and logs into the agent context. These may include sensitive or untrusted text.

Skill content
`Env: .Config.Env` ... `/containers/${id}/logs?stdout=1&stderr=1&tail=${tail}`
Recommendation

Treat container logs and environment values as data, not instructions, and avoid broad log/inspect requests for sensitive workloads.

What this means

Installation or invocation may fail unexpectedly if curl or jq is missing.

Why it was flagged

The skill declares runtime dependencies in SKILL.md, while the registry summary lists no required binaries. This is a packaging/metadata mismatch, not evidence of malicious behavior.

Skill content
metadata: {"openclaw":{"requires":{"bins":["curl","jq"]}}}
Recommendation

Ensure curl and jq are installed, and update registry metadata so users see the dependency requirements before installation.