Docker Mirror

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The Docker mirror purpose is understandable, but the included wrapper can run broad Docker commands with Docker-group privileges and builds shell commands from user input.

Only install this if you trust the environment and intend the agent to have Docker-level authority. Prefer using it only for explicit image pulls, review any non-pull Docker command before allowing it, and avoid passing untrusted image names until the script validates inputs and avoids shell-string execution.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill could perform broad Docker actions beyond mirror-assisted image pulling, including actions that affect containers, images, volumes, networks, or the host through Docker.

Why it was flagged

Any non-pull invocation is passed through to Docker without command allowlisting, so the skill can run container, stop, remove, prune, volume, network, or other high-impact Docker operations.

Skill content
if [[ "$1" != "pull" ]]; then
    sg docker -c "docker $*"
    exit $?
fi
Recommendation

Restrict the wrapper to the intended `pull` workflow or require explicit user approval for non-pull Docker commands, especially `run`, `rm`, `rmi`, `volume`, `network`, and `system prune`.

What this means

A malformed or adversarial image name could cause local shell commands to run with the same Docker-group context as the wrapper.

Why it was flagged

The script builds a shell command string using the image argument and passes it to `sg -c`; without validating Docker image names or safely passing arguments, shell metacharacters in input could be interpreted as additional commands.

Skill content
if sg docker -c "docker pull $IMAGE" 2>&1; then
Recommendation

Validate image references against Docker’s allowed format and avoid composing shell strings; pass arguments through a safer execution path or quote/escape them robustly.

What this means

If installed in an environment where the agent can invoke the skill, the agent may gain practical control over Docker operations with potentially host-level consequences.

Why it was flagged

The script intentionally switches into the Docker group before executing commands; Docker-group access is a powerful delegated privilege and the wrapper does not limit that privilege to the stated mirror-pull behavior.

Skill content
sg docker -c "docker $*"
Recommendation

Use only in a trusted local environment, limit invocation to explicit user-requested pulls, and consider a narrower helper that cannot execute arbitrary Docker subcommands.

What this means

Users may not realize before installation that the skill depends on local Docker and group-switching behavior.

Why it was flagged

The registry metadata does not declare the runtime assumptions that the artifacts themselves state and use, including `sg`, Docker, and a Linux environment.

Skill content
Required binaries (all must exist): none
Required binaries (at least one): none
OS restriction: none
Recommendation

Declare `sg` and Docker as required binaries and restrict the supported OS to Linux so users can assess the environment impact before installation.