docker-first-runner
Pass
Audited by Gen Agent Trust Hub on Mar 23, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/detect-env.jsuseschild_process.execSyncto execute system commands such asdocker --version,docker ps, andpython3 --versionto identify the host environment. While these specific commands are hardcoded, synchronous execution of shell commands is a sensitive capability. - [COMMAND_EXECUTION]: Instructions in
SKILL.mdandreferences/strategy-guide.mdguide the AI to construct shell commands by interpolating variables (e.g.,node scripts/version-compare.js "$(本地版本)"). If an attacker can influence the environment data or the version strings processed by the agent, this pattern could be exploited for command injection. - [EXTERNAL_DOWNLOADS]: The skill references and downloads official Docker images (e.g.,
python:3.11-slim,node:18-alpine,ruby:3.1-alpine) from well-known official registries for containerized execution. - [PROMPT_INJECTION]: The skill contains a vulnerability surface for indirect prompt injection (Category 8).
- Ingestion points: Environment metadata captured by
scripts/detect-env.jsand external version requirements defined inreferences/language-matrix.md. - Boundary markers: Absent; there are no delimiters or instructions to ignore embedded commands in the processed data.
- Capability inventory: Host-level shell execution through
execSyncinscripts/detect-env.jsand the agent's ability to rundockerandnodecommands as instructed in the guides. - Sanitization: The
version-compare.jsscript and the associated manual commands do not include sanitization or escaping for the arguments passed from the agent's context to the shell.
Audit Metadata