Docker Container Rerun

PassAudited by VirusTotal on Mar 25, 2026.

Findings (1)

The skill bundle contains a Python script (scripts/update_docker_run_container.py) that executes a user-provided string via subprocess.run(shell=True). While the script attempts to validate that the command starts with 'docker run', this check is insufficient to prevent shell injection (e.g., via command chaining or subshells). This represents a critical security vulnerability that allows for arbitrary code execution on the host, although it appears to be a design flaw rather than an intentional backdoor, as the behavior aligns with the stated purpose of recreating Docker containers.