From dockercraft
Use when checking Docker configuration for security gaps, performance issues, or production readiness problems in Dockerfile or docker-compose.yml
npx claudepluginhub jugrajsingh/skillgarden --plugin dockercraftThis skill is limited to using the following tools:
Comprehensive audit of Dockerfile and docker-compose.yml against best practices.
Acquire memory dumps from live systems/VMs and analyze with Volatility 3 for processes, networks, DLLs, injections in incident response or malware hunts.
Provides x86-64/ARM disassembly patterns, calling conventions, control flow recognition for static analysis of executables and compiled binaries.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
Comprehensive audit of Dockerfile and docker-compose.yml against best practices.
Read references/audit-checks.md for the full checklist. Four categories:
Glob: Dockerfile, Dockerfile.*, docker-compose*.yml, docker-compose*.yaml, .dockerignore
For each file found, evaluate all relevant checks.
For detailed Dockerfile analysis, dispatch the dockerfile-reviewer agent:
Task: dockerfile-reviewer agent
Input: Dockerfile path and optional compose path
Output: Structured review with severity levels
Use the audit-report.md template. Fill in:
After presenting the report, ask via AskUserQuestion:
| Priority | Criteria |
|---|---|
| High | Security: root user, secrets in image, no .dockerignore |
| Medium | Performance: no multi-stage, no cache mounts, large base image |
| Low | Production: missing HEALTHCHECK, shell form CMD, no resource limits |