Docker Sandbox
PassAudited by VirusTotal on May 12, 2026.
Overview
Type: OpenClaw Skill Name: docker-sandbox Version: 1.0.0 The OpenClaw AgentSkills skill bundle for 'docker-sandbox' is classified as benign. Its stated purpose is to create and manage isolated Docker sandboxed VM environments for safely executing untrusted code or agent workloads. All capabilities described, such as running arbitrary commands, mounting workspaces, and network controls, are explicitly designed to operate within this isolated environment. The documentation emphasizes security features like network policy controls to mitigate risks from code running inside the sandbox, rather than introducing risks to the host system. There is no evidence of prompt injection against the agent, data exfiltration, malicious execution on the host, or obfuscation within the provided files.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Commands run in the sandbox can install packages, run agents, and change files available inside the sandbox.
The skill exposes a broad command-execution pattern inside Docker sandboxes. That is expected for this purpose, but users should still review what commands are run.
docker sandbox exec [options] <sandbox> <command> [args...]
Use explicit sandbox names and workspace paths, review commands before running them, and prefer restrictive network policies for untrusted code.
Untrusted code or agents may be able to read or modify the mounted project workspace.
The sandbox is intentionally connected to the chosen host workspace, so unsafe or destructive actions may affect those project files rather than being completely isolated.
The workspace path on the host is mounted into the sandbox via virtiofs.
Use disposable copies or carefully chosen workspace directories when testing untrusted packages or destructive commands.
A detached process or saved sandbox could continue existing beyond the immediate task if not stopped or removed.
The command reference includes background execution, and the skill also documents saving sandbox state as reusable templates. This persistence is disclosed, but users should keep track of it.
-d # Detach (background)
Avoid detached execution unless needed, and clean up sandboxes with stop or rm after testing.
