hardening-docker-daemon-configuration

Warn

Audited by Snyk on Apr 9, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). SKILL.md and references/workflows.md explicitly instruct fetching and executing third‑party resources — e.g., running "docker run ... docker/docker-bench-security" (pulls a public Docker Hub image) and "curl -fsSL https://get.docker.com/rootless | sh" — whose output and behavior are consumed as part of the audit/hardening workflow and can materially influence subsequent actions.

MEDIUM W013: Attempt to modify system services in skill instructions.

  • Attempt to modify system services in skill instructions detected (high risk: 1.00). The skill explicitly instructs creating/modifying system files under /etc, running sudo/systemctl/auditctl commands, changing socket ownership/permissions and installing services—actions that require root and directly modify the host system state.

Issues (2)

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

W013
MEDIUM

Attempt to modify system services in skill instructions.

Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 9, 2026, 09:41 AM
Issues
2