Loading...
Loading...
Run Dockle to audit container images against CIS Docker Benchmark and best practices. Checks for running as root, sensitive files, HEALTHCHECK, and more.
npx skill4agent add vchirrav/owasp-secure-coding-md container-scan-docklebrew install goodwithtech/r/dockledockle --versiondockle --format json --output dockle-results.json <image>:<tag>dockle --ignore CIS-DI-0001 --format json <image>dockle --accept-key DOCKER_CONTENT_TRUST --format json <image>| # | Level | Code | Title | Finding |
|---|-------|------|-------|---------|| Code | Description |
|---|---|
| CIS-DI-0001 | Create a user for the container (don't run as root) |
| CIS-DI-0002 | Add HEALTHCHECK instruction |
| CIS-DI-0003 | Do not use update instructions alone |
| CIS-DI-0005 | Do not use COPY with sensitive files (.env, .git, etc.) |
| CIS-DI-0006 | Add LABEL to the image |
| CIS-DI-0008 | Confirm safety of setuid/setgid files |
| CIS-DI-0009 | Use COPY instead of ADD |
| CIS-DI-0010 | Do not store secrets in LABEL or ENV |
| DKL-DI-0001 | Avoid sudo usage |
| DKL-DI-0002 | Avoid sensitive directory mount |
| DKL-DI-0005 | Clear package manager cache |