Complete dockerfile toolkit with generation and validation capabilities
94
94%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
A comprehensive security checklist for Dockerfiles and container images.
docker exec for debugging instead of SSHUse specific base image tags
FROM alpine:3.21 # Not alpine:latestRun as non-root
USER appuserClean package cache
RUN apk add --no-cache packageDon't expose unnecessary ports
# Only expose what's needed
EXPOSE 8080Add health checks
HEALTHCHECK CMD curl -f http://localhost/ || exit 1| Category | Critical | High | Medium |
|---|---|---|---|
| Base Image | Use official, pin version | Scan for CVEs | Update regularly |
| Secrets | Never in code | Use secrets mgmt | Scan commits |
| Users | Run as non-root | High UID | Proper permissions |
| Network | TLS only | Minimal exposure | Firewall rules |
| Runtime | Drop capabilities | Read-only FS | Resource limits |