From container-security-scanner
Scans container images and Dockerfiles for vulnerabilities, misconfigurations, and compliance using Trivy, Grype, Snyk, and Hadolint. Generates reports with remediation steps and CI/CD integration.
npx claudepluginhub jeremylongshore/claude-code-plugins-plus-skills --plugin container-security-scannerThis skill is limited to using the following tools:
Scan container images and Dockerfiles for vulnerabilities, misconfigurations, and compliance violations using Trivy, Grype, Snyk Container, and Hadolint. Analyze base images, OS packages, application dependencies, and runtime configurations to produce actionable security reports with remediation guidance.
Scans container images, filesystems, and Kubernetes manifests for vulnerabilities, misconfigurations, secrets, and licenses using Trivy. Includes SBOM generation and CI/CD integration for security assessments.
Scans container images, filesystems, Kubernetes manifests for vulnerabilities, misconfigurations, secrets using Trivy, with SBOM generation and CI/CD integration.
Review container security including image scanning, runtime policies, and supply chain integrity.
Share bugs, ideas, or general feedback.
Scan container images and Dockerfiles for vulnerabilities, misconfigurations, and compliance violations using Trivy, Grype, Snyk Container, and Hadolint. Analyze base images, OS packages, application dependencies, and runtime configurations to produce actionable security reports with remediation guidance.
trivy, grype, snyk, or docker scouthadolint for Dockerfile best practice validationjq for parsing JSON scan resultshadolint Dockerfile to catch misconfigurations before build (privileged instructions, pinned versions, shell best practices)trivy image <image:tag> or grype <image:tag>trivy image --scanners secret <image:tag>| Error | Cause | Solution |
|---|---|---|
trivy: unable to pull image | Image not found locally or registry auth failure | Pull image first with docker pull or configure registry credentials |
CRITICAL vulnerability found but no fix available | Upstream package has no patch yet | Document as accepted risk, use --ignore-unfixed flag, or switch to an alternative base image |
hadolint: DL3008 pin versions in apt-get install | Packages installed without version pinning | Add version pins (e.g., apt-get install nginx=1.24.0-1) or use --no-install-recommends |
Scan timeout on large image | Image has many layers or large filesystem | Use --timeout 15m flag; scan a specific layer or use --skip-dirs to exclude test data |
False positive CVE | Scanner database maps CVE to a package not actually exploitable | Add to .trivyignore or Grype ignore file with justification comment |