docker-impl-go-templates
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill documents methods to extract container-provided metadata such as names, labels, and environment variables, as well as health check logs. Since these values are external and potentially attacker-controlled, their use in agent decision-making or automated commands constitutes an indirect prompt injection risk.\n
- Ingestion points: Environment variables and labels in
SKILL.md; health check logs inreferences/examples.md.\n - Boundary markers: Not present in the provided templates to isolate external data from instructions.\n
- Capability inventory: Examples in
SKILL.mdandreferences/examples.mddemonstrate using extracted names to executedocker stopanddocker rm.\n - Sanitization: Minimal sanitization is shown in scripting examples (e.g., removing leading slashes via
sed), but it is not comprehensive across all patterns.\n- [DATA_EXFILTRATION]: The skill provides specific patterns for accessing sensitive container data, such as environment variables (.Config.Env) which often house credentials, and the host path for container logs (.LogPath).\n- [COMMAND_EXECUTION]: The skill provides numerous shell command patterns and automation scripts that integrate Docker CLI output with administrative functions.
Audit Metadata