473,287 Members | 3,319 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes and contribute your articles to a community of 473,287 developers and data experts.

An open source container security detection tool

1
Recently, I have been researching open source container security related tools and found many excellent projects include trivy, anchor, etc., which have done a good job in vulnerability detection; while there are not many projects focusing on other security detection. So I am more interested in Chaitin's open-source inquiring container security toolset, so I record the process of using it for the first time.

First, let's take a look at the specific functions of the official description:
1. Supports detection of abnormal historical commands, malicious files, weak passwords, sensitive information, backdoors, etc.
2. Support image asset inventory, inventory image and image software assets.
3. Support local images scanning and repository images scanning, and integrate with mainstream image repositories such as Docker Hub.
4. Support mainstream CI/CD integration such as GitHub action and jenkins.
5. Run in parallel container mode, no need to compile separately, out-of-the-box.
6. Adapt to a variety of container runtimes.

## 1、Use the runner program to detect five kinds of threats in the local image

- `./parallel-container-run.sh scan-host -h` ,View scan local mirror command parameters
- `./parallel-container-run.sh scan-host` ,Scan all local images with all identified plugins
- View the current list of plugins `./parallel-container-run.sh list plugin`
- `./parallel-container-run.sh scan-host -g "**/veinmind-weakpass"` ,Specifies to scan only with weak password plugins

## 2、Use the host program to detect the warehouse image

- `./parallel-container-run.sh scan-registry -h` ,View scan remote warehouse command parameters
- `./parallel-container-run.sh scan-registry oodo` ,Try scanning the oodo image in the docker hub public repository

## 3、Integrated use in Github Action / Gitlab / Jenkins

Go directly to the official picture, I just don't want to try it.

## 4、Summarize
After simple use, it is very easy to get started, and there is almost no understanding cost. Several sensitive information and weak passwords were detected when scanning the local image. See the introduction of the malicious sample detection integrated with VT, which is quite reliable. I hope the official will continue to increase the detection rules of the tool. The issue mentioned in the research will be integrated with Jenkins so quickly. Yes, it seems that it is maintained by special personnel, and the project activity is quite high.

you can search veinmind on github to find it ,thanks for read.
Jul 12 '22 #1
0 3528

Sign in to post your reply or Sign up for a free account.

Similar topics

188
by: Ilias Lazaridis | last post by:
I'm a newcomer to python: - E01: The Java Failure - May Python Helps? http://groups-beta.google.com/group/comp.lang.python/msg/75f0c5c35374f553 - I've download (as suggested) the python...
0
by: Unigroup of New York | last post by:
Content-Type: multipart/mixed; boundary="------------C465DF38DCB38DD2AF7117E0" Lines: 327 Date: Tue, 15 Feb 2005 23:36:38 -0500 NNTP-Posting-Host: 24.46.113.251 X-Complaints-To: abuse@cv.net...
1
by: Markus Seibold | last post by:
Hi, I am looking for an open source (free) data modeling tool for PostgreSQL. It should - if possible - support: - E-R-Modelling - relational data model / modeling - (GUI SQL interface to...
115
by: TheAd | last post by:
At this moment I use MsAccess and i can build about every databound application i want. Who knows about a serious open source alternative? Because Windows will be a client platform for some time, i...
10
by: Roberto Nunnari | last post by:
Hi all. I announce that there's a brand new, free FSM Generator in the Open Source arena: NunniFSMGen - release 1.0-RC1 http://nunnifsmgen.nunnisoft.ch NunniFSMGen is a java tool that...
158
by: Giovanni Bajo | last post by:
Hello, I just read this mail by Brett Cannon: http://mail.python.org/pipermail/python-dev/2006-October/069139.html where the "PSF infrastracture committee", after weeks of evaluation, recommends...
6
by: Erwin Moller | last post by:
Hi, Maybe this is old news for some of you, but I just found this: http://blogs.zdnet.com/BTL/?p=9847 It will include a JavaScript Virtual Machine built from scratch. Regards, Erwin Moller
0
by: manchun | last post by:
Since Hadoop evolution, the developers have gotten the new abstraction and release with more features. The new releases and versions of Hadoop are to provide improved Hadoop with the removal of...
2
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 7 Feb 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:30 (7.30PM). In this month's session, the creator of the excellent VBE...
0
by: MeoLessi9 | last post by:
I have VirtualBox installed on Windows 11 and now I would like to install Kali on a virtual machine. However, on the official website, I see two options: "Installer images" and "Virtual machines"....
0
by: DolphinDB | last post by:
The formulas of 101 quantitative trading alphas used by WorldQuant were presented in the paper 101 Formulaic Alphas. However, some formulas are complex, leading to challenges in calculation. Take...
0
by: DolphinDB | last post by:
Tired of spending countless mintues downsampling your data? Look no further! In this article, you’ll learn how to efficiently downsample 6.48 billion high-frequency records to 61 million...
0
by: Aftab Ahmad | last post by:
So, I have written a code for a cmd called "Send WhatsApp Message" to open and send WhatsApp messaage. The code is given below. Dim IE As Object Set IE =...
0
isladogs
by: isladogs | last post by:
The next Access Europe meeting will be on Wednesday 6 Mar 2024 starting at 18:00 UK time (6PM UTC) and finishing at about 19:15 (7.15PM). In this month's session, we are pleased to welcome back...
0
by: Vimpel783 | last post by:
Hello! Guys, I found this code on the Internet, but I need to modify it a little. It works well, the problem is this: Data is sent from only one cell, in this case B5, but it is necessary that data...
0
by: jfyes | last post by:
As a hardware engineer, after seeing that CEIWEI recently released a new tool for Modbus RTU Over TCP/UDP filtering and monitoring, I actively went to its official website to take a look. It turned...
1
by: PapaRatzi | last post by:
Hello, I am teaching myself MS Access forms design and Visual Basic. I've created a table to capture a list of Top 30 singles and forms to capture new entries. The final step is a form (unbound)...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.