Docker Essentials 1.0.0
PassAudited by ClawScan on May 1, 2026.
Overview
This is an instruction-only Docker command reference; it includes powerful Docker operations that should be run deliberately, but the artifacts show no hidden code, credentials, or deceptive behavior.
This skill is reasonable as a Docker command reference. Before letting an agent run commands from it, explicitly confirm destructive cleanup commands, image pushes, volume mounts, port exposure, root exec sessions, and builds from unfamiliar Dockerfiles or images.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
An agent or user running these commands could remove development containers, images, or data volumes.
These are destructive Docker cleanup/removal examples. They are expected for a Docker essentials reference, but they can delete containers, images, or volume-backed data if run without explicit intent.
docker rm -f container_name ... docker container prune ... docker-compose down -v ... docker system prune --volumes
Require explicit user confirmation before running prune, remove, down -v, or other destructive Docker commands.
Running untrusted images or Dockerfiles could execute unwanted commands inside containers and may interact with mounted host files or exposed ports.
Docker run, exec, and build commands execute containerized code or Dockerfile build steps. This is central to the skill purpose, but it depends on the trustworthiness of images, containers, and local build contexts.
docker run -it ubuntu bash ... docker exec -u root -it container_name bash ... docker build --no-cache -t myapp .
Use trusted images and Dockerfiles, review volume mounts and port mappings, and approve root exec/build actions before running them.
Compose workflows may fail or use an unexpected local Compose installation if docker-compose is not available or differs from Docker's compose plugin.
The skill declares only the docker binary but includes docker-compose commands. This is a purpose-aligned dependency note, not evidence of malicious behavior.
requires":{"bins":["docker"]} ... docker-compose upEnsure Docker Compose is installed and use the intended command form for your environment, such as docker compose or docker-compose.
