wagmios
Analysis
This is a coherent WAGMIOS/Docker management skill, but it gives the agent real container-management power, so users should limit API scopes and use trusted hosts.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
| `containers:write` | Create, start, stop, restart containers | ... | `containers:delete` | Remove containers (with user confirmation) | ... | `marketplace:write` | Install, start, stop marketplace apps |
The skill intentionally exposes Docker/container mutation through the WAGMIOS API. This fits the stated purpose, but these actions can affect running services and stored application data.
POST /api/marketplace/start ... Pulls image and starts the container(s) via `docker compose up -d`.
Marketplace app installation necessarily pulls and runs container images/compose definitions. This is expected for the feature, but image and compose provenance are not described in the skill artifacts.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Every request requires the `X-API-Key` header. The user provides the key and base URL at runtime — do not store it.
The skill relies on a scoped API key that delegates Docker-management authority to the agent. The artifact gives appropriate handling instructions, but the credential is still sensitive.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
GET /api/containers/{id}/logs?tail=100 ... Returns container log output. ... GET /api/containers/{id}/config ... Returns the full container configuration (environment, volumes, ports, etc.).Container logs and configs may contain secrets, sensitive paths, or untrusted text that the agent will ingest as context.
**Base URL:** `http://localhost:5179` (user provides — may differ for remote/multi-machine setups)
The documented default is local HTTP, and the skill supports remote or multi-machine URLs. Remote use over plain HTTP could expose API keys or container data on the network.
