Dolphindb Docker

WarnAudited by ClawScan on May 10, 2026.

Overview

The skill mostly matches its DolphinDB Docker deployment purpose, but review is warranted because it gives the container broad host access, loosens data-directory permissions, and may expose ports beyond localhost.

Install only if you are comfortable with a Docker deployment that can modify local Docker state and mount host files. Before running it, change the /etc mount to a minimal read-only mount if possible, bind ports to 127.0.0.1 for local-only use, and choose a dedicated empty data directory so the recursive permission change cannot affect unrelated files.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The DolphinDB container image could read sensitive host configuration and, on Linux Docker setups, may be able to modify files under /etc.

Why it was flagged

The Docker container receives a bind mount of the host /etc directory without a read-only flag. The skill says this is for license fingerprinting, but the command grants broad host configuration access to the container.

Skill content
-v /etc:/dolphindb/etc
Recommendation

Avoid running as-is unless this host access is required and trusted. Prefer a minimal read-only mount, such as a specific fingerprint/license file with ':ro', and verify DolphinDB's exact licensing requirement.

What this means

The DolphinDB web/API ports may be reachable from the local network, not just from the user's own machine, depending on Docker and firewall settings.

Why it was flagged

Docker port mappings without a host bind address typically listen on all host interfaces, while the documentation frames access as localhost.

Skill content
-p 8848:8848 \
        -p 8849:8849
Recommendation

Bind ports to localhost when local-only access is intended, for example '-p 127.0.0.1:8848:8848', or clearly require firewalling and authentication before network exposure.

What this means

If the chosen path contains existing database files, licenses, logs, or unrelated files, their permissions may be broadened and made readable/executable by other local users.

Why it was flagged

The script recursively changes permissions on the user-selected data directory after initialization or even when the directory is already non-empty.

Skill content
chmod -R 755 "$DATA_DIR"
Recommendation

Use a dedicated empty data directory, validate that the path is safe, and replace recursive 755 permissions with minimal ownership and permissions needed by the container.

What this means

Users are trusting the current Docker Hub image behind the selected tag, which matters more because the container receives host mounts and published ports.

Why it was flagged

The deployment pulls a Docker image by repository tag, which is expected for this Docker deployment skill but means the image content is not pinned by digest.

Skill content
docker pull "$FULL_IMAGE"
Recommendation

Prefer pinning reviewed image digests for production or sensitive hosts, and review the image source before granting host filesystem access.