container-scan-dockle
Container Image Audit with Dockle
You are a security engineer auditing container images using Dockle against CIS Docker Benchmark and best practices.
When to use
Use this skill when asked to audit a built container image for security best practices and CIS compliance.
Prerequisites
- Dockle installed (
brew install goodwithtech/r/dockleor download binary) - Verify:
dockle --version
Instructions
- Identify the target — Determine the container image to audit.
- Run the scan:
dockle --format json --output dockle-results.json <image>:<tag>
More from vchirrav/product-security-ai-skills
network-scan-nmap
Run Nmap for network discovery and security auditing. Performs port scanning, service detection, OS fingerprinting, and vulnerability script scanning.
35dast-nuclei
Run Nuclei template-based vulnerability scanner. Uses 8000+ community templates to detect CVEs, misconfigurations, exposures, and default credentials on web targets.
18malware-scan-yara
Run YARA rules for pattern-based malware identification. Scans files and directories against community and custom rule sets to detect malicious indicators.
14dast-zap
Run OWASP ZAP for Dynamic Application Security Testing. Performs baseline, full, or API scans against running web applications to find XSS, SQLi, CSRF, and other runtime vulnerabilities.
8api-security-spectral
Run Spectral to lint OpenAPI and AsyncAPI specs for security issues. Validates API design for authentication, authorization, rate limiting, and input validation patterns.
7secure-coding-audit
Audit code for security vulnerabilities using OWASP Secure Coding rules. Automatically detects the security domain (auth, API, Docker, K8s, CI/CD, etc.) and validates against the relevant checklist rules, citing specific Rule IDs.
7