Docker Image Vulnerability Triage
Runs Trivy against a Docker image and produces a prioritized CVE list grouped by severity with fix availability. Filters out CVEs with no available fix. Outputs a structured report suitable for Jira or GitHub Issues.
Runs Trivy against a Docker image and produces a prioritized CVE list grouped by severity with fix availability. Filters out CVEs with no available fix. Outputs a structured report suitable for Jira or GitHub Issues.
npx skills add agentskillexchange/skills --skill docker-image-vulnerability-triage
Docker Image Vulnerability Triage is built around Docker container platform. The underlying ecosystem is represented by moby/moby (71,560+ GitHub stars). It gives an agent a more technical and reliable way to work with the tool than a thin one-line wrapper, using stable interfaces like Docker Engine API, Dockerfiles, docker compose, image builds, registries and preserving the operational context that matters for real tasks.
In practice, the skill gives an agent a stable interface to docker so it can inspect state, run the right operation, and produce a result that fits into a larger engineering or operations pipeline. The original use case is clear: Runs Trivy against a Docker image and produces a prioritized CVE list grouped by severity with fix availability. Filters out CVEs with no available fix. Outputs a structured report suitable for Jira or GitHub Issues. The implementation typically relies on Docker Engine API, Dockerfiles, docker compose, image builds, registries, with configuration passed through environment variables, connection strings, service tokens, or workspace config depending on the upstream platform.
- Accesses Docker Engine API, Dockerfiles, docker compose, image builds, registries instead of scraping a UI, which makes runs easier to audit and retry.
- Supports structured inputs and outputs so another tool, agent, or CI step can consume the result.
- Can be wired into cron jobs, webhook handlers, MCP transports, or local CLI workflows depending on the skill format.
- Fits into broader integration points such as local dev, packaging, runtime isolation, and deployment pipelines.
As a runbook-style skill, the value is not just tool access but operational sequencing: check the right signals first, reduce alert noise, and produce a summary that another engineer can act on immediately. In security-oriented usage, the skill emphasizes read-only discovery, evidence capture, and machine-readable output such as SARIF, JSON, or structured findings so results can flow into existing review pipelines. Key integration points include local dev, packaging, runtime isolation, and deployment pipelines. In a real environment that usually means passing credentials through env vars or app config, respecting rate limits and permission scopes, and returning structured artifacts that can be attached to tickets, pull requests, dashboards, or follow-up automations.