Managing Docker containers via docker-socket-proxy

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is coherent and purpose-aligned for Docker container reporting and controlled restarts, but it needs careful whitelist and proxy configuration because it can read logs and restart services.

Install only if you intend this agent to inspect Docker container status/logs and restart selected containers. Before use, configure `DOCKER_HOST` to a least-privilege docker-socket-proxy, set `SYSCTL_WHITELIST_PATH`, keep the whitelist narrow, and verify that log output is redacted before it is shown or shared.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A permitted restart can temporarily disrupt a service if the whitelist or user request is wrong.

Why it was flagged

The skill can perform a high-impact Docker action, but the artifact clearly scopes it to whitelisted containers, explicit user requests, and a cooldown.

Skill content
`docker restart <name>` | Restart a container (explicit request only!) ... Verify container is in whitelist AND `can_restart: true` ... do not restart the same container more than once per 5 minutes.
Recommendation

Keep the whitelist minimal, set `can_restart: true` only for safe containers, and review restart requests before allowing the agent to act.

What this means

If the docker-socket-proxy is over-permissive, the agent may have more container-management authority than intended.

Why it was flagged

The skill relies on delegated access to a Docker socket proxy; this is expected for the purpose, but the proxy defines the real privilege boundary.

Skill content
`DOCKER_HOST` environment variable is pre-configured (do NOT override it manually) ... If `DOCKER_HOST` is not set, do NOT guess the address.
Recommendation

Configure docker-socket-proxy to expose only the needed Docker API operations and use the whitelist as a second layer of restriction.

What this means

Sensitive values from logs could appear in the conversation if the agent or user relies on raw script output.

Why it was flagged

The helper script reads container logs and prints selected error lines. Logs are untrusted and may contain secrets or prompt-like text; the script itself does not implement the SKILL.md redaction guidance.

Skill content
LOG_CACHE=$(timeout 30 docker logs --since "${SINCE}" --tail 5000 "${NAME}" 2>&1 || true) ... echo "${LOG_CACHE}" | grep -i 'error\|exception\|fatal\|traceback' | sort -u | tail -10
Recommendation

Treat log contents as untrusted data, redact secrets before showing output, and avoid displaying raw log lines unless necessary.

What this means

Users may not realize the skill needs Docker tooling and Docker proxy environment variables until runtime.

Why it was flagged

Registry metadata does not declare runtime dependencies that SKILL.md documents, including Docker CLI, jq, DOCKER_HOST, and SYSCTL_WHITELIST_PATH. This is a setup/provenance clarity issue, not hidden behavior.

Skill content
Required binaries (all must exist): none ... Required env vars: none ... Env var declarations: none
Recommendation

Document these requirements in metadata so users and platforms can validate the environment before use.