Firebase-tools resolve-docker-vulnerabilities
Skill to resolve Docker vulnerabilities for the firebase-cli image. Use this skill when you need to check for vulnerabilities in the firebase-cli Docker image and address them.
git clone https://github.com/firebase/firebase-tools
T=$(mktemp -d) && git clone --depth=1 https://github.com/firebase/firebase-tools "$T" && mkdir -p ~/.claude/skills && cp -r "$T/.agent/skills/resolve-docker-vulnerabilities" ~/.claude/skills/firebase-firebase-tools-resolve-docker-vulnerabilities && rm -rf "$T"
.agent/skills/resolve-docker-vulnerabilities/SKILL.mdResolve Docker Vulnerabilities
This skill guides you through the process of listing images, checking for vulnerabilities, planning remediation, and verifying the fixes by publishing to a staging repository.
Workflow
1. Publish to Staging
Run the build on
fir-tools-builds and publish to the staging repository in firebase-cli to see the baseline vulnerabilities after the build's own updates.
./scripts/publish/firebase-docker-image/run.sh --build-project fir-tools-builds --repo staging --target firebase-cli
2. Check Vulnerabilities
Check the vulnerability reports for the image just pushed to staging. You will need to find the digest of the image first.
gcloud artifacts docker images list us-docker.pkg.dev/firebase-cli/staging/firebase
Then check vulnerabilities using the digest:
gcloud artifacts vulnerabilities list us-docker.pkg.dev/firebase-cli/staging/firebase@sha256:<DIGEST>
To investigate which layers and file paths are causing the vulnerabilities, run the command with
--format=json:
gcloud artifacts vulnerabilities list us-docker.pkg.dev/firebase-cli/staging/firebase@sha256:<DIGEST> --format=json
Look for
fileLocation and layerDetails in the output to understand if the vulnerability is in:
- Project dependencies (e.g., under
). Recommend updating the package.json and running the build again. You can use overrides as needed here to upgrade transitive dependencies to non-breaking versions./usr/local/node_packages/node_modules - Global tools (e.g., under
). Recommend waiting for upstream fixes (which will be pulled in as soon as they are available)./usr/local/lib/node_modules/npm - External binaries (e.g., emulator JARs under
). Recommend raising these issues to the team owning the emulator./root/.cache/firebase/emulators
3. Plan Remediation
For each vulnerable package identified:
- Determine if it can be updated in the Dockerfile.
- Check if a fix is available.
- Create a plan to address it (e.g., upgrading the base image, upgrading the specific package).
4. Present Plan to User
Present the proposed plan to the user for approval before making changes.
5. Apply Fix and Re-Verify
After making changes to the Dockerfile or related files, repeat Step 1 and Step 2 to publish a new staged image and verify that the vulnerabilities have been resolved.