Analysis tools logo

24 Containers Static Analysis Tools

Type:
Any
96

Mega-Linter

  • Type: cli
246

Mega-Linter can handle any type of project thanks to its 70+ embedded Linters, its advanced reporting, runnable on any CI system or locally, with assisted installation and configuration, able to apply formatting and fixes

12

DeepSource

  • Type: service

In-depth static analysis to find issues in verticals of bug risks, security, anti-patterns, performance, documentation and style. Native integrations with GitHub, GitLab and Bitbucket. Less than 5% false positives.

6

KubeLinter

  • Type: cli
1469

KubeLinter is a static analysis tool that checks Kubernetes YAML files and Helm charts to ensure the applications represented in them adhere to best practices.

5

Codeac

  • Type: service

Automated code review tool integrates with GitHub, Bitbucket and GitLab (even self-hosted). Available for JavaScript, TypeScript, Python, Ruby, Go, PHP, Java, Docker, and more. (open-source free)

3

Haskell Dockerfile Linter

  • Type: cli
5638

A smarter Dockerfile linter that helps you build best practice Docker images.

2

CodeFlow

  • Type: service

Automated code analysis tool to deal with technical depth. Integrates with Bitbucket and Gitlab. (free for Open Source Projects)

2

kube-score

  • Type: cli
1287

Static code analysis of your Kubernetes object definitions.

2

trivy

  • Type: cli
8014

A Simple and Comprehensive Vulnerability Scanner for Containers and other Artifacts, Suitable for CI. Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn, etc.). Checks containers and filesystems.

1

ShiftLeft Scan

  • Type: cli
  • Type: service
304

Scan is a free open-source DevSecOps platform for detecting security issues in source code and dependencies. It supports a broad range of languages and CI/CD pipelines.

1

Snyk

  • Type: service

Vulnerability scanner for dependencies of node.js apps (free for Open Source Projects).

0

anchore

  • Type: cli
1286

Discover, analyze, and certify container images. A service that analyzes Docker images and applies user-defined acceptance policies to allow automated container image validation and certification

0

clair

  • Type: cli
7972

Vulnerability Static Analysis for Containers.

0

collector

  • Type: cli
288

Run arbitrary scripts inside containers, and gather useful information.

0

dagda

  • Type: cli
849

Perform static analysis of known vulnerabilities in docker images/containers.

0

Docker Label Inspector

  • Type: cli
79

Lint and validate Dockerfile labels.

0

kics

  • Type: cli
627

Find security vulnerabilities, compliance issues, and infrastructure misconfigurations in your infrastructure-as-code. Supports Terraform, Kubernetes, Docker, AWS CloudFormation and Ansible

0

kubeval

  • Type: cli
2438

Validates your Kubernetes configuration files and supports multiple Kubernetes versions.

0

Offensive 360

  • Type: web

Commercial Static Code Analysis system doesn't require building the source code or pre-compilation.

0

OpenSCAP

  • Type: cli
808

Suite of automated audit tools to examine the configuration and known vulnerabilities following the NIST-certified Security Content Automation Protocol (SCAP).

0

Qualys Container Security

  • Type: service

Container native application protection to provide visibility and control of containerized applications.

0

sysdig

  • Type: service

A secure DevOps platform for cloud and container forensics. Built on an open source stack, Sysdig provides Docker image scanning and created Falco, the open standard for runtime threat detection for containers, Kubernetes and cloud.

0

Vuls

  • Type: cli
8588

Agent-less Linux vulnerability scanner based on information from NVD, OVAL, etc. It has some container image support, although is not a container specific tool.

❤️ Sponsor this project

We are currently looking for partners who want to sponsor hosting and development of the project.

Check out our Github Sponsors page here

Missing an entry? Please let us know.