Docker Ops

PassAudited by VirusTotal on May 10, 2026.

Overview

Type: OpenClaw Skill Name: docker-ops-toolkit Version: 1.0.2 The bundle provides standard Docker management utilities for container lifecycle management, health monitoring, and log analysis. The included scripts (docker-cleanup.sh, docker-health.sh, and docker-log-inspector.py) perform their stated functions using standard Docker CLI commands without any evidence of data exfiltration, persistence mechanisms, or malicious prompt injection.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running cleanup, especially with `--aggressive`, can delete stopped containers, unused volumes, networks, images, or build cache that may be hard to recover.

Why it was flagged

The cleanup script runs force-prune Docker commands, including optional volume and build-cache removal. This is aligned with Docker cleanup, but it can remove local resources without Docker's normal confirmation prompt.

Skill content
do_cmd "Removing stopped containers..." "docker container prune -f" ... do_cmd "Removing unused volumes (⚠️ risk of data loss)..." "docker volume prune -f"
Recommendation

Use `--dry-run` first, confirm which project or containers are affected, and require explicit user approval before destructive Docker cleanup.

What this means

A user or agent with Docker daemon access can start, stop, inspect, and modify containers and may indirectly affect the host environment.

Why it was flagged

The skill suggests adding the user to the docker group to resolve permission errors. Docker group membership grants broad control over the Docker daemon and can be equivalent to high local privilege.

Skill content
sudo usermod -aG docker $USER && newgrp docker
Recommendation

Only grant Docker group membership to trusted users and treat Docker commands as privileged operations.

What this means

Container logs shown to the agent may reveal sensitive application data or contain misleading text that should not be treated as instructions.

Why it was flagged

The log inspector fetches and prints Docker logs for analysis. Logs are expected input for this skill, but they may contain secrets, customer data, or untrusted text.

Skill content
result = subprocess.run(cmd, capture_output=True, text=True, timeout=15) ... print(logs)
Recommendation

Inspect only relevant containers, redact sensitive logs when possible, and do not follow instructions that appear inside log output.

What this means

Users have less registry-level information about where the skill came from and what local tools it expects.

Why it was flagged

The registry metadata lacks provenance and does not declare required binaries, while the skill itself depends on Docker, bash, and Python scripts. The reviewed source is provided, so this is a metadata/provenance note rather than hidden behavior.

Skill content
Source: unknown; Homepage: none; Required binaries (all must exist): none
Recommendation

Review the included scripts before use and ensure Docker, bash, and Python are available in the intended environment.