feat(skill): introduce owasp-docker#1245
feat(skill): introduce owasp-docker#1245JasonTheDeveloper wants to merge 16 commits intomicrosoft:mainfrom
owasp-docker#1245Conversation
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## main #1245 +/- ##
==========================================
- Coverage 87.72% 87.71% -0.02%
==========================================
Files 61 61
Lines 9320 9320
==========================================
- Hits 8176 8175 -1
- Misses 1144 1145 +1
Flags with carried forward coverage won't be shown. Click here to find out more. 🚀 New features to boost your workflow:
|
|
I ran the OWASP Security Assessment ReportDate: 2026-04-01 Caution This prompt is an assistive tool only and does not replace professional security tooling (SAST, DAST, SCA, penetration testing, compliance scanners) or qualified human review. All AI-generated vulnerability findings must be reviewed and validated by qualified security professionals before use. AI outputs may contain inaccuracies, miss critical threats, or produce recommendations that are incomplete or inappropriate for your environment. Executive SummaryThe OWASP Docker Top 6 assessment of hve-core evaluated six controls against the repository's devcontainer configuration. Two controls received PARTIAL status at LOW severity: DKR02 (floating base-image tag with no Dependabot docker ecosystem entry) was CONFIRMED, and DKR04 (missing Summary Counts
Severity Breakdown (FAIL + PARTIAL only)
Verification Summary
Findings by Frameworkowasp-docker
Detailed Remediation GuidanceLOW SeverityDKR02:2025 — Patch Management StrategyFile: .devcontainer/devcontainer.json#L3 Offending Code: "image": "${localEnv:HVE_DEVCONTAINER_IMAGE:mcr.microsoft.com/devcontainers/base:2-jammy}",Example Fix: - package-ecosystem: "devcontainers"
directory: "/"
schedule:
interval: "weekly"
day: "monday"
labels:
- "dependencies"
- "devcontainer"
commit-message:
prefix: "chore"
include: "scope"Steps:
Verification verdict: CONFIRMED — Floating tag at DKR04:2025 — Secure Defaults and HardeningFile: .devcontainer/devcontainer.json#L1-L42 Offending Code: {
"name": "HVE Core - Markdown Editing",
"image": "${localEnv:HVE_DEVCONTAINER_IMAGE:mcr.microsoft.com/devcontainers/base:2-jammy}",
"features": {
"ghcr.io/devcontainers/features/node:1": { "version": "20" },
"ghcr.io/devcontainers/features/python:1": { "version": "3.11" },
...
},
"remoteUser": "vscode"
}Example Fix: {
"name": "HVE Core - Markdown Editing",
"image": "${localEnv:HVE_DEVCONTAINER_IMAGE:mcr.microsoft.com/devcontainers/base:2-jammy}",
"runArgs": [
"--security-opt=no-new-privileges"
],
"features": {Steps:
Verification verdict: DOWNGRADED — Missing Disproved FindingsNone. Remediation Checklist
Appendix: Skills Used
|
45e9628 to
d2e828a
Compare
Pull Request
Description
In alignment with phase 2 discussed in #480 (comment), this PR introduces the OWASP Docker Top 6 (not top 10 because the source material only contains 6 items) skill to hve-core and the security reviewer agent.
Related Issue(s)
Closes #1242
Type of Change
Select all that apply:
Code & Documentation:
Infrastructure & Configuration:
AI Artifacts:
prompt-builderagent and addressed all feedback.github/instructions/*.instructions.md).github/prompts/*.prompt.md).github/agents/*.agent.md).github/skills/*/SKILL.md)Other:
.ps1,.sh,.py)Testing
To be able to test the
owasp-dockerskill using the security reviewer agent you will need a repository containing a Dockerfile.Security Revieweragent or invoke the agent via the/security-revewinstructionanalyse the code and produce a vulnerability reportcodebase-profiler.agent.mdpicks up that the repository contains docker configurations and thus uses theowasp-dockerskill then that's all you need.owasp-dockeris used, in your prompt addtargetSkill=owasp-dockerYou should see in the output report the
owasp-dockerskill being referenced and used.Checklist
Required Checks
AI Artifact Contributions
/prompt-analyzeto review contributionprompt-builderreviewRequired Automated Checks
The following validation commands must pass before merging:
npm run lint:mdnpm run spell-checknpm run lint:frontmatternpm run validate:skillsnpm run lint:md-linksnpm run lint:psnpm run plugin:generateSecurity Considerations