Docker Sandbox

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: docker-sandbox Version: 1.0.0 The OpenClaw AgentSkills skill bundle for 'docker-sandbox' is classified as benign. Its stated purpose is to create and manage isolated Docker sandboxed VM environments for safely executing untrusted code or agent workloads. All capabilities described, such as running arbitrary commands, mounting workspaces, and network controls, are explicitly designed to operate within this isolated environment. The documentation emphasizes security features like network policy controls to mitigate risks from code running inside the sandbox, rather than introducing risks to the host system. There is no evidence of prompt injection against the agent, data exfiltration, malicious execution on the host, or obfuscation within the provided files.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Commands run in the sandbox can install packages, run agents, and change files available inside the sandbox.

Why it was flagged

The skill exposes a broad command-execution pattern inside Docker sandboxes. That is expected for this purpose, but users should still review what commands are run.

Skill content
docker sandbox exec [options] <sandbox> <command> [args...]
Recommendation

Use explicit sandbox names and workspace paths, review commands before running them, and prefer restrictive network policies for untrusted code.

NoteHigh Confidence
ASI08: Cascading Failures
What this means

Untrusted code or agents may be able to read or modify the mounted project workspace.

Why it was flagged

The sandbox is intentionally connected to the chosen host workspace, so unsafe or destructive actions may affect those project files rather than being completely isolated.

Skill content
The workspace path on the host is mounted into the sandbox via virtiofs.
Recommendation

Use disposable copies or carefully chosen workspace directories when testing untrusted packages or destructive commands.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

A detached process or saved sandbox could continue existing beyond the immediate task if not stopped or removed.

Why it was flagged

The command reference includes background execution, and the skill also documents saving sandbox state as reusable templates. This persistence is disclosed, but users should keep track of it.

Skill content
-d                  # Detach (background)
Recommendation

Avoid detached execution unless needed, and clean up sandboxes with stop or rm after testing.