Supply Chain

Assess Docker Image Security with cnspec

Scan Docker images for security misconfigurations and CVEs using cnspec.

Use cnspec to scan Docker images for security misconfigurations, CVEs, and end-of-life operating systems using the built-in Mondoo security policies or your own custom policies.

Scan Docker images

Scan Docker images in public or private container registries using their registry name:

cnspec scan docker ubuntu:latest
cnspec scan docker elastic/elasticsearch:7.2.0
cnspec scan docker gcr.io/google-containers/ubuntu:22.04
cnspec scan docker registry.access.redhat.com/ubi8/ubi

Scan options

OptionDescription
--container-proxyHTTP proxy to use for container pulls
--disable-cacheDisable the in-memory cache for images (significantly slows scans)
--discoverEnable discovery of nested assets (all, auto, container, container-images)
--asset-nameOverride the asset name
--annotationAdd an annotation to the asset (key=value)
--incognitoRun in incognito mode (do not report results to Mondoo Platform)
-o, --outputSet the output format (compact, full, json, junit, summary, yaml)
-f, --policy-bundlePath to a policy file (local path, s3:// URI, or http(s):// URL)
--policySpecify policies to execute (requires --policy-bundle)
--risk-thresholdExit with status 1 if any risk meets or exceeds this value (0-100)
--sudoElevate privileges with sudo
-j, --jsonReturn the results as JSON

Learn more

On this page