portainer-exploit

Fail

Audited by Gen Agent Trust Hub on Apr 22, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFE
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill provides Python scripts and exploit chains for CVE-2018-12678 and Docker API abuse to achieve remote code execution on the Portainer target instances.
  • [DATA_EXPOSURE_AND_EXFILTRATION]: Includes scripts for automated credential testing with common default passwords and provides command examples for reading sensitive host-level files like /etc/shadow.
  • [PRIVILEGE_ESCALATION]: Contains detailed instructions and functional code for container escape, specifically by creating containers with host root filesystem mounts and high privileges to gain root access on the host machine.
  • [PERSISTENCE_MECHANISMS]: Includes automated functions (add_ssh_key, add_user) specifically designed to maintain unauthorized access to the host machine after the initial compromise.
  • [DYNAMIC_EXECUTION]: The skill dynamically generates and executes Docker API configurations and shell commands at runtime to facilitate its exploitation operations.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Apr 22, 2026, 10:08 AM