Back to skill
Skillv1.0.0
ClawScan security
Lu Auto Deploy · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignMar 8, 2026, 5:10 PM
- Verdict
- benign
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- This is an instruction-only Docker deployment helper whose templates and commands match its stated purpose, but it assumes running shell/docker commands (including mounts like /var/run/docker.sock and host paths) so review before executing.
- Guidance
- This skill is an instruction-only template for deploying containers; it appears coherent with that purpose. Before using it: 1) do NOT run the provided commands blindly—inspect and adapt paths (it assumes /vol1/1000) and ports to your environment; 2) be cautious with mounts such as /var/run/docker.sock and host directories—these give containers high privileges on the host (Portainer example mounts the Docker socket); 3) prefer pinned image tags rather than :latest for production and validate images you pull from Docker Hub; 4) run templates on an isolated/test host first; 5) verify the skill source/provenance (registry metadata here is inconsistent: registry lists unknown source though _meta.json contains a GitHub URL) and only allow any automated execution if you trust the agent’s runtime and have explicit confirmation/approval steps in place.
Review Dimensions
- Purpose & Capability
- okName/description match the content: SKILL.md provides docker-compose and docker run templates for monitoring, media, tool, and security services. Required binaries/credentials are not requested and are consistent with a documentation/template skill.
- Instruction Scope
- noteThe instructions tell an operator to create directories and execute docker-compose/docker run commands (e.g., mkdir -p /vol1/1000/Docker/..., docker-compose up -d, docker run ... -v /var/run/docker.sock:/var/run/docker.sock). This is expected for deployment templates but is potentially dangerous if executed blindly: mounting /var/run/docker.sock or host directories grants containers powerful host access. The SKILL.md does not ask to read unrelated files or exfiltrate data, but it assumes specific host paths (/vol1/1000) that may not exist and could lead to unintended file writes.
- Install Mechanism
- okNo install spec or code is included (instruction-only), so nothing is downloaded or written to disk by the skill itself.
- Credentials
- okThe skill declares no environment variables or credentials and its instructions do not reference secrets or external tokens. This is proportionate for a template/helper that provides commands and compose files.
- Persistence & Privilege
- okThe skill is not force-included (always: false) and does not claim persistent system privileges or modify other skills. It can be invoked autonomously by the agent per platform defaults, which is normal; users should be aware agent autonomous actions could attempt to run commands if the agent has such capabilities.
