Docker Sandbox
AdvisoryAudited by Static analysis on Apr 30, 2026.
Overview
No suspicious patterns detected.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Commands run in the sandbox can install packages, run agents, and change files available inside the sandbox.
The skill exposes a broad command-execution pattern inside Docker sandboxes. That is expected for this purpose, but users should still review what commands are run.
docker sandbox exec [options] <sandbox> <command> [args...]
Use explicit sandbox names and workspace paths, review commands before running them, and prefer restrictive network policies for untrusted code.
Untrusted code or agents may be able to read or modify the mounted project workspace.
The sandbox is intentionally connected to the chosen host workspace, so unsafe or destructive actions may affect those project files rather than being completely isolated.
The workspace path on the host is mounted into the sandbox via virtiofs.
Use disposable copies or carefully chosen workspace directories when testing untrusted packages or destructive commands.
A detached process or saved sandbox could continue existing beyond the immediate task if not stopped or removed.
The command reference includes background execution, and the skill also documents saving sandbox state as reusable templates. This persistence is disclosed, but users should keep track of it.
-d # Detach (background)
Avoid detached execution unless needed, and clean up sandboxes with stop or rm after testing.
