Docker MCP Toolkit

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is mostly transparent and purpose-aligned, but it gives OpenClaw broad Docker MCP control that can invoke high-impact tools and persistently change enabled MCP servers.

Install only if you intend to let OpenClaw manage and invoke Docker MCP tools. Keep enabled MCP servers minimal, inspect tool schemas before use, require explicit approval for writes/config changes/code execution, use least-privilege credentials, and keep the MCP gateway bound to localhost.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If those MCP tools are enabled, an agent could potentially change MCP configuration, run code, or mutate connected systems such as databases.

Why it was flagged

This documents a generic path for the agent to call management and execution-style MCP tools; the artifacts do not show a tool allowlist or approval boundary for high-impact calls.

Skill content
Docker’s gateway can expose management tools like: ... `mcp-config-set`, `mcp-remove`, `mcp-exec`, `code-mode` ... call them via `docker mcp tools call <tool>`
Recommendation

Restrict enabled MCP servers and tools, use read-only or least-privilege credentials, and require explicit user approval or an allowlist before mcp-exec, code-mode, config, or write operations.

What this means

A server enabled for one task may remain available later, expanding what future agent sessions can do.

Why it was flagged

Enabling an MCP server changes the Docker MCP configuration and can make additional tools available to later workflows.

Skill content
docker mcp server enable "$SERVER"
Recommendation

Confirm server names before enabling them, keep only necessary servers enabled, and disable unused servers after a task.

What this means

MCP tools may act with the permissions of configured database or service credentials.

Why it was flagged

The skill expects MCP servers to use external credentials; this is purpose-aligned and includes good guidance, but those credentials define the agent's delegated authority.

Skill content
Prefer Docker Desktop’s secrets/keychain integration when possible. ... Use least-privilege credentials (separate Neon role with only required grants).
Recommendation

Use dedicated, least-privilege credentials and avoid pasting secrets into chat; rotate any credential that is exposed.

What this means

If the MCP endpoint is exposed beyond localhost, other clients could potentially reach tools intended for local use.

Why it was flagged

The skill relies on an MCP gateway/endpoint boundary; the artifact correctly warns that exposing it publicly would increase risk.

Skill content
Bind ports to **127.0.0.1** by default. Do **not** expose the MCP endpoint publicly.
Recommendation

Keep the gateway bound to localhost, use SSH or WireGuard for remote access, and do not open MCP ports directly to the internet.

What this means

Users may be surprised by the local tool requirements or by the fact that the skill depends on Docker MCP CLI access.

Why it was flagged

The included scripts require local Docker and jq even though the registry metadata lists no required binaries; no hidden download or remote installer is shown.

Skill content
if ! command -v docker >/dev/null 2>&1; then ... if ! command -v jq >/dev/null 2>&1; then
Recommendation

Declare Docker, docker mcp, and jq requirements in metadata and make the shell/Docker capability clear before installation.