Docker Sandbox Lucas

ReviewAudited by ClawScan on May 1, 2026.

Overview

The skill is a coherent Docker sandbox instruction guide, but users should notice that it can run arbitrary sandbox commands, mount workspace files, contact agent providers, and keep sandbox state.

This appears to be a benign instruction-only Docker sandbox skill. Before installing or using it, make sure Docker Desktop sandbox support is available, run untrusted work in disposable sandboxes, avoid mounting sensitive workspaces unless needed, configure network deny/allow rules, and clean up detached processes or saved sandbox templates when finished.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Commands run in the sandbox can change the sandbox environment and may affect any mounted workspace files.

Why it was flagged

The skill teaches the agent/user how to execute arbitrary commands inside a Docker sandbox. This is central to the stated sandbox purpose, but it is still a broad execution capability.

Skill content
docker sandbox exec [options] <sandbox> <command> [args...]
Recommendation

Use disposable sandboxes for untrusted code and review commands before running them, especially package installs, shell commands, or destructive operations.

What this means

A destructive command may not escape the sandbox, but it can still damage or modify the mounted project directory.

Why it was flagged

The skill promotes destructive testing while also disclosing that the current directory is mounted into the sandbox, so mistakes can still affect files in the mounted project workspace.

Skill content
Testing destructive operations without risking the host ... The current directory mounted via virtiofs
Recommendation

Use a copy, backup, or throwaway workspace when testing destructive operations, and remove/reset sandboxes after use.

What this means

Project files or prompts may be exposed to the selected agent/provider if the agent is given access to them.

Why it was flagged

The skill is designed to run third-party agents in the sandbox. That is expected, but mounted workspace content and prompts may be processed by those agents depending on how they are invoked.

Skill content
Supports Claude, Codex, Copilot, Gemini, and Kiro agents with network proxy controls.
Recommendation

Use the network proxy allowlist/deny policy and avoid mounting or prompting with sensitive files unless the selected provider is trusted for that data.

What this means

Detached processes or saved sandbox state may continue or be reused longer than intended.

Why it was flagged

The command reference includes detached/background execution and saving sandbox state as a reusable template. These persistence features are disclosed and fit the sandbox management purpose.

Skill content
-d                  # Detach (background)
...
docker sandbox save <sandbox>
Recommendation

List, stop, remove, or reset sandboxes after experiments, and only save templates after verifying their contents.