Create, manage, and execute agent tools (claude, codex) inside Docker sandboxes for isolated code execution. Use when running agent loops, spawning tool subprocesses, or any task requiring process isolation. Triggers on "sandbox", "isolated execution", "docker sandbox", "safe agent execution", or when working on agent loop infrastructure.
92
88%
Does it follow best practices?
Impact
100%
3.22xAverage score across 3 eval scenarios
Risky
Do not use without reviewing
Security
1 high severity finding. You should review these findings carefully before considering using this skill.
The skill handles credentials insecurely by requiring the agent to include secret values verbatim in its generated output. This exposes credentials in the agent’s context and conversation history, creating a risk of data exfiltration.
Insecure credential handling detected (high risk: 1.00). The prompt includes examples that embed real-looking tokens and instruct injecting secret values verbatim into commands/heredocs (e.g., -e "CLAUDE_CODE_OAUTH_TOKEN=$TOKEN" and inserting ${AUTH} into a heredoc), which forces the agent to handle and output secrets directly.
825972c
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.