Docker Health Monitor

PendingVirusTotal audit pending.

Overview

No VirusTotal analysis has been recorded yet. File reputation checks will appear here once the artifact hash has been scanned.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A normal health report may contact registries, use configured registry access, consume bandwidth, and change the Docker daemon's local image cache or tags.

Why it was flagged

The default full health check calls check_images, and check_images runs docker pull for each container image rather than using a read-only manifest comparison.

Skill content
local mode="${1:---all}" ... --all|--full|"") ... check_images ... if docker pull --quiet "$image" 2>/dev/null; then
Recommendation

Run --images or --all only after approving this side effect, especially on production or remote Docker contexts; the skill should switch to a read-only manifest check or prompt clearly before pulling.

What this means

Users may believe they are running a read-only audit when the skill can actually modify Docker image state.

Why it was flagged

The documentation frames image checking as advisory and treats docker pull as a later user action, but the included script already runs docker pull during the check.

Skill content
`--images` checks are advisory — uses `docker inspect` for image digests ... Outdated images: Run `docker pull` to update images
Recommendation

Update the documentation to disclose that image checks pull images, or change the implementation so checks are truly advisory and require explicit approval before pulling.

What this means

The skill can inspect Docker containers and, depending on Docker context, may act against a remote or production Docker daemon.

Why it was flagged

Docker socket or root/docker-group access is powerful and can affect local or remote daemons, but this access is disclosed and is broadly necessary for Docker health monitoring.

Skill content
Requires access to the Docker socket (`/var/run/docker.sock`) — run as root or add user to the `docker` group ... Works with both local Docker and remote Docker contexts (DOCKER_HOST env var)
Recommendation

Verify the active Docker context before use and avoid granting this skill access to production Docker daemons unless you are comfortable with its Docker commands.

What this means

Pre-install checks may not warn users that Docker access is required.

Why it was flagged

The script requires Docker CLI and Docker daemon access, but the registry metadata does not declare those requirements; this is an under-declaration rather than hidden code.

Skill content
Required binaries (all must exist): none ... Capability signals: No capability tags were derived.
Recommendation

Declare the docker binary and Docker daemon access capability in metadata so users can see the requirement before installation.