ln-731-docker-generator
Pass
Audited by Gen Agent Trust Hub on May 7, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches shared and reference template files from the author's official GitHub repository if they are not found in the local file system.
- [CREDENTIALS_UNSAFE]: The docker-compose.yml template contains a default password placeholder (
changeme) for the database service, which is a standard pattern for local development templates. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface because it extracts version numbers and project metadata from local project files (e.g., package.json, *.csproj) and interpolates them into the generated configuration files.
- Ingestion points: Project metadata files including
package.json,*.csproj, andpyproject.tomlparsed during the variable substitution phase. - Boundary markers: None; variables are substituted directly into the templates without delimiters or 'ignore' instructions.
- Capability inventory: File write operations for generating
Dockerfile,docker-compose.yml, andnginx.confas described in Phase 4 of the workflow. - Sanitization: No explicit validation or sanitization of the strings extracted from project files is mentioned before they are used in file generation.
- [DATA_EXPOSURE]: The skill proactively mitigates data exposure by providing a .dockerignore template that excludes environment files (.env), private keys (.pem, .key), and secret directories from the Docker build context.
Audit Metadata