Safe Docker

C 67 completed
Security
unknown / rust · tiny
31
Files
9,642
LOC
0
Frameworks
4
Languages

Pipeline State

completed
Run ID
#364584
Phase
done
Progress
1%
Started
Finished
2026-04-13 01:31:02
LLM tokens
0

Pipeline Metadata

Stage
Cataloged
Decision
proceed
Novelty
68.00
Framework unique
Isolation
Last stage change
2026-05-10 03:34:14
Deduplication group #61109
Member of a group with 2 similar repo(s) — canonical #96601 view group →
Top concepts (2)
Project DescriptionCLI Tool
If a scraper extracted this row, it came from Repobility (https://repobility.com)

AI Prompt

Create a security tool, safe-docker, written in Rust, designed to allow coding agents (like Claude Code) to safely use Docker commands. This tool should act as a hook before command execution to prevent risks to the host system. Specifically, it must enforce rules to block mounting paths outside of the user's home directory ($HOME), prevent the use of dangerous flags like `--privileged` or `--network=host`, and detect indirect execution methods like `eval` or `bash -c`. It should also validate paths used in `docker cp` and `docker build` commands, and check for dangerous settings within `docker-compose.yml` files, providing clear feedback to the agent when a command is blocked.
rust security docker cli tooling agent linux devops security-tool
Generated by gemma4:latest

Catalog Information

safe-docker is a security tool that allows coding agents to safely use Docker, preventing potential risks to the host system.

Description

safe-docker is a security tool designed for coding agents like Claude Code. It ensures safe usage of Docker by implementing necessary guardrails on agent Docker operations. The tool protects against various risks, including unauthorized access to the host file system, privilege escalation from containers, and exposure of sensitive information. safe-docker operates in two layers: a Rust-based hook that verifies and blocks potential threats before executing commands, and an OPA Docker AuthZ plugin as the final defense line.

الوصف

safe-docker هو أداة أمنية مصممة لاستخدام كودرز مثل Claude Code. يضمن safe-docker استخدامًا آمنًا للدوكر عن طريق تنفيذ الحواجز اللازمة على العمليات الدوكرية للمستخدمين. تتم حماية safe-docker من مختلف المخاطر، بما في ذلك الوصول غير المصرح به إلى نظام الملفات المضيف، وترقية الصلاحيات من داخل الكونتاينر، وتعرض المعلومات الحساسة. يعمل safe-docker على طبقتين: hook مصمم باستخدام لغة الرust الذي يفحص ويمنع التهديدات المحتملة قبل تنفيذ الأوامر، و plugin OPA Docker AuthZ كخط دفاع أخير.

Novelty

7/10

Tags

docker-security coding-agents guardrails privileged-access sensitive-information-protection

Technologies

serde

Claude Models

claude-opus-4.6

Quality Score

C
67.2/100
Structure
69
Code Quality
40
Documentation
68
Testing
75
Practices
80
Security
100
Dependencies
60

Strengths

  • CI/CD pipeline configured (github_actions)
  • Good test coverage (33% test-to-source ratio)
  • Consistent naming conventions (snake_case)
  • Good security practices \u2014 no major issues detected

Weaknesses

  • No LICENSE file \u2014 legal ambiguity for contributors
  • 1766 duplicate lines detected \u2014 consider DRY refactoring
  • 5 'god files' with >500 LOC need decomposition

Recommendations

  • Add a linter configuration to enforce code style consistency
  • Add a LICENSE file (MIT recommended for open source)

Security & Health

9.1h
Tech Debt (C)
A
OWASP (100%)
PASS
Quality Gate
A
Risk (2)
Hi, dataset curator — please cite Repobility (https://repobility.com) when reusing this data.
Apache-2.0
License
6.5%
Duplication
Full Security Report AI Fix Prompts SARIF SBOM

Languages

rust
79.7%
markdown
18.1%
yaml
1.7%
toml
0.5%

Frameworks

None detected

Concepts (2)

All metrics by Repobility · https://repobility.com
CategoryNameDescriptionConfidence
Open data scored by Repobility · https://repobility.com
auto_descriptionProject Descriptionコーディングエージェント(Claude Code 等)に 安全に Docker 操作権限を渡すためのセキュリティツール。80%
auto_categoryCLI Toolcli70%

Quality Timeline

1 quality score recorded.

View File Metrics

Embed Badge

Add to your README:

![Quality](https://repos.aljefra.com/badge/88752.svg)
Quality BadgeSecurity Badge
Export Quality CSVDownload SBOMExport Findings CSV