Docker
v1.0.4Docker containers, images, Compose stacks, networking, volumes, debugging, production hardening, and the commands that keep real environments stable. Use whe...
⭐ 20· 10.1k·138 current·143 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description focus on Docker and included files are Docker documentation and command recipes. Declared requirement (docker binary) and OS constraints match the stated purpose; there are no unrelated environment variables, credentials, or install steps.
Instruction Scope
SKILL.md and companion files instruct the agent to run standard Docker commands and to apply Docker best-practices. The instructions include destructive maintenance commands (e.g., docker system prune -a --volumes, docker volume prune) and host-affecting operations (e.g., mounting host root, copying files from containers), which are coherent with Docker administration but can be destructive if executed without confirmation. The skill language ('should be applied directly whenever Docker work appears') gives the agent broad scope to act on Docker tasks — consider requiring explicit user confirmation before executing destructive commands.
Install Mechanism
No install spec and no code files — instruction-only. That minimizes disk/write/remote-download risk. There is no third-party download or build step to review.
Credentials
No environment variables, credentials, or config paths are requested. The skill references Docker concepts and host paths in documentation, which is appropriate for its purpose.
Persistence & Privilege
always:false and normal model invocation are used. The skill does not request persistent presence or attempt to modify other skills or system-wide agent settings. Autonomous invocation is allowed by default but is not a unique privilege for this skill.
Assessment
This is a documentation-only Docker skill and appears coherent with its purpose. Before enabling or allowing autonomous runs: (1) confirm the agent will ask you before running destructive commands (prune, volume removal, host mounts, privileged runs), because those commands can delete data or expose the host; (2) ensure the host has the docker binary and that you trust the source (owner unknown) for operational guidance; and (3) restrict skill use to Docker-related tasks only. If you want tighter safety, require explicit user confirmation for any command that modifies or prunes host state, or run the skill in a monitored/testing environment first.Like a lobster shell, security has layers — review code before you run it.
latestvk973x8qccn91nca7k7zt73gfv182qa5g
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🐳 Clawdis
OSLinux · macOS · Windows
Binsdocker
