devcontainer-setup
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The
resources/post_install.pyscript executes shell commands viasubprocess.runwithsudoto adjust directory ownership for mounted volumes. This is a standard procedure in devcontainer environments to ensure the non-root user can access persistent data. - [EXTERNAL_DOWNLOADS]: The
resources/Dockerfiledownloads scripts and binaries from trusted organizations and well-known services, including Anthropic (Claude Code), Vercel (fnm), Microsoft (base images), and Astral (uv). It uses cryptographic SHA256 digests for base images to ensure supply chain integrity. - [PRIVILEGE_ESCALATION]: The
resources/devcontainer.jsonconfiguration grantsNET_ADMINandNET_RAWcapabilities to the container. This allows the use of network management tools likeiptablesandipset, which is intended for network isolation and security testing within the sandbox. - [SAFE]: The skill configures Claude Code with
bypassPermissionsand provides aclaude-yoloalias. This intentionally disables confirmation prompts for tool execution to streamline the developer experience within the isolated container environment. - [SAFE]: The
resources/install.shhelper script includes a security check (check_no_sys_admin) to prevent users from addingSYS_ADMINcapabilities, which would compromise the security of read-only volume mounts.
Audit Metadata