Analysis tools logo

30 Containers Static Analysis Tools

Type:
Any
106

Mega-Linter

  • Type: cli
631

Mega-Linter can handle any type of project thanks to its 70+ embedded Linters, its advanced reporting, runnable on any CI system or locally, with assisted installation and configuration, able to apply formatting and fixes

15

DeepSource

  • Type: service

In-depth static analysis to find issues in verticals of bug risks, security, anti-patterns, performance, documentation and style. Native integrations with GitHub, GitLab and Bitbucket. Less than 5% false positives.

6

KubeLinter

  • Type: cli
1908

KubeLinter is a static analysis tool that checks Kubernetes YAML files and Helm charts to ensure the applications represented in them adhere to best practices.

5

Codeac

  • Type: service

Automated code review tool integrates with GitHub, Bitbucket and GitLab (even self-hosted). Available for JavaScript, TypeScript, Python, Ruby, Go, PHP, Java, Docker, and more. (open-source free)

3

Datree

  • Type: cli
5536

A CLI tool to prevent Kubernetes misconfigurations by ensuring that manifests and Helm charts follow best practices as well as your organization’s policies

3

Haskell Dockerfile Linter

  • Type: cli
6897

A smarter Dockerfile linter that helps you build best practice Docker images.

2

kube-score

  • Type: cli
1747

Static code analysis of your Kubernetes object definitions.

2

trivy

  • Type: cli
11848

A Simple and Comprehensive Vulnerability Scanner for Containers and other Artifacts, Suitable for CI. Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn, etc.). Checks containers and filesystems.

1

CodeFlow

  • Type: service

Automated code analysis tool to deal with technical depth. Integrates with Bitbucket and Gitlab. (free for Open Source Projects)

1

kics

  • Type: cli
1029

Find security vulnerabilities, compliance issues, and infrastructure misconfigurations in your infrastructure-as-code. Supports Terraform, Kubernetes, Docker, AWS CloudFormation and Ansible

1

Snyk

  • Type: service

Vulnerability scanner for dependencies of node.js apps (free for Open Source Projects).

1

ThreatMapper

  • Type: service
  • Type: web
1540

Vulnerability Scanner and Risk Evaluation for containers, serverless and hosts at runtime. ThreatMapper generates runtime BOMs from dependencies and operating system packages, matches against multiple threat feeds, scans for unprotected secrets, and scores issues based on severity and risk-of-exploit.

0

anchore

  • Type: cli
1448

Discover, analyze, and certify container images. A service that analyzes Docker images and applies user-defined acceptance policies to allow automated container image validation and certification

0

chart-testing

  • Type: cli
794

ct is the the tool for testing Helm charts. It is meant to be used for linting and testing pull requests. It automatically detects charts changed against the target branch.

0

clair

  • Type: cli
8745

Vulnerability Static Analysis for Containers.

0

clusterlint

  • Type: cli
469

Clusterlint queries live Kubernetes clusters for resources, executes common and platform specific checks against these resources and provides actionable feedback to cluster operators. It is a non invasive tool that is run externally. Clusterlint does not alter the resource configurations.

0

dagda

  • Type: cli
963

Perform static analysis of known vulnerabilities in docker images/containers.

0

Docker Label Inspector

  • Type: cli
80

Lint and validate Dockerfile labels.

0

kube-lint

  • Type: cli
158

A linter for Kubernetes resources with a customizable rule set. You define a list of rules that you would like to validate against your resources and kube-lint will evaluate those rules against them.

0

kube-linter

  • Type: cli
1908

KubeLinter is a static analysis tool that checks Kubernetes YAML files and Helm charts to ensure the applications represented in them adhere to best practices.

0

kubeval

  • Type: cli
2823

Validates your Kubernetes configuration files and supports multiple Kubernetes versions.

0

Offensive 360

  • Type: web

Commercial Static Code Analysis system doesn't require building the source code or pre-compilation.

0

OpenSCAP

  • Type: cli
930

Suite of automated audit tools to examine the configuration and known vulnerabilities following the NIST-certified Security Content Automation Protocol (SCAP).

0

Qualys Container Security

  • Type: service

Container native application protection to provide visibility and control of containerized applications.

0

sysdig

  • Type: service

A secure DevOps platform for cloud and container forensics. Built on an open source stack, Sysdig provides Docker image scanning and created Falco, the open standard for runtime threat detection for containers, Kubernetes and cloud.

0

Vuls

  • Type: cli
9253

Agent-less Linux vulnerability scanner based on information from NVD, OVAL, etc. It has some container image support, although is not a container specific tool.

0

collector

  • Type: cli
290

Run arbitrary scripts inside containers, and gather useful information.

-4

ShiftLeft Scan

  • Type: cli
  • Type: service
465

Scan is a free open-source DevSecOps platform for detecting security issues in source code and dependencies. It supports a broad range of languages and CI/CD pipelines.

❤️ Sponsor this project

We are currently looking for partners who want to sponsor hosting and development of the project.

Check out our Github Sponsors page here

Missing an entry? Please let us know.