{"id":13684503,"url":"https://github.com/aquasecurity/docker-bench","last_synced_at":"2025-10-13T07:22:35.619Z","repository":{"id":48050702,"uuid":"106416084","full_name":"aquasecurity/docker-bench","owner":"aquasecurity","description":"Checks whether Docker is deployed according to security best practices as defined in the CIS Docker Benchmark","archived":false,"fork":false,"pushed_at":"2025-01-28T17:37:26.000Z","size":3534,"stargazers_count":216,"open_issues_count":11,"forks_count":67,"subscribers_count":12,"default_branch":"main","last_synced_at":"2025-04-30T21:38:45.645Z","etag":null,"topics":["cis-docker-benchmarks","docker"],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/aquasecurity.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null}},"created_at":"2017-10-10T12:45:39.000Z","updated_at":"2025-04-04T03:49:38.000Z","dependencies_parsed_at":"2024-01-14T16:09:08.803Z","dependency_job_id":"88f66aaa-5ddd-4e39-b21e-72468cd06719","html_url":"https://github.com/aquasecurity/docker-bench","commit_stats":null,"previous_names":[],"tags_count":5,"template":false,"template_full_name":null,"purl":"pkg:github/aquasecurity/docker-bench","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/aquasecurity%2Fdocker-bench","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/aquasecurity%2Fdocker-bench/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/aquasecurity%2Fdocker-bench/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/aquasecurity%2Fdocker-bench/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/aquasecurity","download_url":"https://codeload.github.com/aquasecurity/docker-bench/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/aquasecurity%2Fdocker-bench/sbom","scorecard":{"id":204661,"data":{"date":"2025-08-11","repo":{"name":"github.com/aquasecurity/docker-bench","commit":"c463c39d1c80f3a801073a9187967dbf46588d47"},"scorecard":{"version":"v5.2.1-40-gf6ed084d","commit":"f6ed084d17c9236477efd66e5b258b9d4cc7b389"},"score":4.4,"checks":[{"name":"Code-Review","score":8,"reason":"Found 16/18 approved changesets -- score normalized to 8","details":null,"documentation":{"short":"Determines if the project requires human code review before pull requests (aka merge requests) are merged.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#code-review"}},{"name":"Token-Permissions","score":0,"reason":"detected GitHub workflow tokens with excessive permissions","details":["Warn: no topLevel permission defined: .github/workflows/build.yml:1","Warn: no topLevel permission defined: .github/workflows/release.yml:1","Info: no jobLevel write permissions found"],"documentation":{"short":"Determines if the project's workflows follow the principle of least privilege.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#token-permissions"}},{"name":"Maintained","score":0,"reason":"0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0","details":null,"documentation":{"short":"Determines if the project is \"actively maintained\".","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#maintained"}},{"name":"Dangerous-Workflow","score":10,"reason":"no dangerous workflow patterns detected","details":null,"documentation":{"short":"Determines if the project's GitHub Action workflows avoid dangerous patterns.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#dangerous-workflow"}},{"name":"Binary-Artifacts","score":10,"reason":"no binaries found in the repo","details":null,"documentation":{"short":"Determines if the project has generated executable (binary) artifacts in the source repository.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#binary-artifacts"}},{"name":"Pinned-Dependencies","score":0,"reason":"dependency not pinned by hash detected -- score normalized to 0","details":["Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:21: update your workflow using https://app.stepsecurity.io/secureworkflow/aquasecurity/docker-bench/build.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/build.yml:25: update your workflow using https://app.stepsecurity.io/secureworkflow/aquasecurity/docker-bench/build.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/build.yml:29: update your workflow using https://app.stepsecurity.io/secureworkflow/aquasecurity/docker-bench/build.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/build.yml:33: update your workflow using https://app.stepsecurity.io/secureworkflow/aquasecurity/docker-bench/build.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:12: update your workflow using https://app.stepsecurity.io/secureworkflow/aquasecurity/docker-bench/release.yml/main?enable=pin","Warn: GitHub-owned GitHubAction not pinned by hash: .github/workflows/release.yml:16: update your workflow using https://app.stepsecurity.io/secureworkflow/aquasecurity/docker-bench/release.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/release.yml:20: update your workflow using https://app.stepsecurity.io/secureworkflow/aquasecurity/docker-bench/release.yml/main?enable=pin","Warn: third-party GitHubAction not pinned by hash: .github/workflows/release.yml:24: update your workflow using https://app.stepsecurity.io/secureworkflow/aquasecurity/docker-bench/release.yml/main?enable=pin","Info:   0 out of   4 GitHub-owned GitHubAction dependencies pinned","Info:   0 out of   4 third-party GitHubAction dependencies pinned"],"documentation":{"short":"Determines if the project has declared and pinned the dependencies of its build process.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#pinned-dependencies"}},{"name":"CII-Best-Practices","score":0,"reason":"no effort to earn an OpenSSF best practices badge detected","details":null,"documentation":{"short":"Determines if the project has an OpenSSF (formerly CII) Best Practices Badge.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#cii-best-practices"}},{"name":"Fuzzing","score":0,"reason":"project is not fuzzed","details":["Warn: no fuzzer integrations found"],"documentation":{"short":"Determines if the project uses fuzzing.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#fuzzing"}},{"name":"License","score":10,"reason":"license file detected","details":["Info: project has a license file: LICENSE:0","Info: FSF or OSI recognized license: Apache License 2.0: LICENSE:0"],"documentation":{"short":"Determines if the project has defined a license.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#license"}},{"name":"Packaging","score":10,"reason":"packaging workflow detected","details":["Info: Project packages its releases by way of GitHub Actions.: .github/workflows/build.yml:16"],"documentation":{"short":"Determines if the project is published as a package that others can easily download, install, easily update, and uninstall.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#packaging"}},{"name":"Signed-Releases","score":0,"reason":"Project has not signed or included provenance with any releases.","details":["Warn: release artifact v0.5.0 not signed: https://api.github.com/repos/aquasecurity/docker-bench/releases/47111518","Warn: release artifact v0.4.0 not signed: https://api.github.com/repos/aquasecurity/docker-bench/releases/30570935","Warn: release artifact v0.3.0 not signed: https://api.github.com/repos/aquasecurity/docker-bench/releases/25277393","Warn: release artifact v0.2.2 not signed: https://api.github.com/repos/aquasecurity/docker-bench/releases/22718984","Warn: release artifact v0.0.1-alpha.1 not signed: https://api.github.com/repos/aquasecurity/docker-bench/releases/22717706","Warn: release artifact v0.5.0 does not have provenance: https://api.github.com/repos/aquasecurity/docker-bench/releases/47111518","Warn: release artifact v0.4.0 does not have provenance: https://api.github.com/repos/aquasecurity/docker-bench/releases/30570935","Warn: release artifact v0.3.0 does not have provenance: https://api.github.com/repos/aquasecurity/docker-bench/releases/25277393","Warn: release artifact v0.2.2 does not have provenance: https://api.github.com/repos/aquasecurity/docker-bench/releases/22718984","Warn: release artifact v0.0.1-alpha.1 does not have provenance: https://api.github.com/repos/aquasecurity/docker-bench/releases/22717706"],"documentation":{"short":"Determines if the project cryptographically signs release artifacts.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#signed-releases"}},{"name":"Branch-Protection","score":-1,"reason":"internal error: error during branchesHandler.setup: internal error: githubv4.Query: Resource not accessible by integration","details":null,"documentation":{"short":"Determines if the default and release branches are protected with GitHub's branch protection settings.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#branch-protection"}},{"name":"Security-Policy","score":0,"reason":"security policy file not detected","details":["Warn: no security policy file detected","Warn: no security file to analyze","Warn: no security file to analyze","Warn: no security file to analyze"],"documentation":{"short":"Determines if the project has published a security policy.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#security-policy"}},{"name":"SAST","score":0,"reason":"SAST tool is not run on all commits -- score normalized to 0","details":["Warn: 0 commits out of 30 are checked with a SAST tool"],"documentation":{"short":"Determines if the project uses static code analysis.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#sast"}},{"name":"Vulnerabilities","score":9,"reason":"1 existing vulnerabilities detected","details":["Warn: Project is vulnerable to: GO-2025-3372 / GHSA-6wxm-mpqj-6jpf"],"documentation":{"short":"Determines if the project has open, known unfixed vulnerabilities.","url":"https://github.com/ossf/scorecard/blob/f6ed084d17c9236477efd66e5b258b9d4cc7b389/docs/checks.md#vulnerabilities"}}]},"last_synced_at":"2025-08-16T23:27:37.688Z","repository_id":48050702,"created_at":"2025-08-16T23:27:37.688Z","updated_at":"2025-08-16T23:27:37.688Z"},"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":279014111,"owners_count":26085463,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-13T02:00:06.723Z","response_time":61,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cis-docker-benchmarks","docker"],"created_at":"2024-08-02T14:00:34.244Z","updated_at":"2025-10-13T07:22:35.597Z","avatar_url":"https://github.com/aquasecurity.png","language":"Go","readme":"[![GitHub Release][release-img]][release]\n[![License][license-img]][license]\n[![Coverage Status][cov-img]][cov]\n[![GitHub Build Actions][build-action-img]][actions]\n[![GitHub Release Actions][release-action-img]][actions]\n\nDocker-bench is a Go application that checks whether Docker is deployed securely by running the checks documented in the [CIS Docker Benchmark](https://www.cisecurity.org/benchmark/docker/).\n\nTests are configured with YAML files, making this tool easy to update as test specifications evolve.\n\n\n## CIS Docker Benchmark support\n\ndocker-bench currently supports tests as defined in the following CIS Docker Benchmarks:\n\n| CIS Benchmark                                                                                    | docker-bench cfg directory   | Docker versions                  |\n|--------------------------------------------------------------------------------------------------|------------------------------|----------------------------------|\n| [CIS Docker Benchmark v1.6.0](https://workbench.cisecurity.org/benchmarks/11818)                 | [cis-1.6.0](./cfg/cis-1.6.0) | 20.10                            |\n| [CIS Docker Benchmark v1.2.0](https://workbench.cisecurity.org/benchmarks/601)                   | [cis-1.2](./cfg/cis-1.2)     | 18.09 and Docker Enterprise 2.1  |\n| [CIS Docker Community Edition Benchmark v1.1.0](https://workbench.cisecurity.org/benchmarks/552) | [cis-1.1](./cfg/cis-1.1)     | 17.06                            |\n| [CIS Docker 1.13.0 Benchmark v1.0.0](https://workbench.cisecurity.org/benchmarks/363)            | [cis-1.0](./cfg/cis-1.0)     | 1.13.0                           |\n\n\ndocker-bench will determine the test set to run based on the Docker version running on the host machine. \nThe version to run tests for can also be specified manually with the `--version \u003cDocker version\u003e` or `--benchmark \u003cCIS benchmark version\u003e` commandline flag.\n\n## Installation\n### Installing from sources\n\nInstall [Go](https://golang.org/doc/install), then\nclone this repository and run as follows (assuming your [$GOPATH is set](https://github.com/golang/go/wiki/GOPATH)):\n\n```shell\ngo get github.com/aquasecurity/docker-bench\ncd $GOPATH/src/github.com/aquasecurity/docker-bench\ngo build -o docker-bench .\n\n# See all supported options\n./docker-bench --help\n\n# Run checks\n./docker-bench\n\n# Run checks for specified Docker version\n./docker-bench --version 18.09\n\n# Run checks for specified cis Benchmark \n./docker-bench --benchmark cis-1.2\n```\n\n# Tests\nTests are specified in definition files `cfg/\u003cversion\u003e/definitions.yaml`,\nwhere `\u003cversion\u003e` is the version of CIS for which the test applies.\n\n# Contributing\nWe welcome PRs and issue reports.\nYour PR is more likely to be accepted if it focuses on just one change.\nPlease include a comment with the results before and after your change.\nYour PR is more likely to be accepted if it includes tests. (We have not historically been very strict about tests, but we would like to improve this!).\nYou're welcome to submit a draft PR if you would like early feedback on an idea or an approach.\nHappy coding!\n\n[actions]: https://github.com/aquasecurity/docker-bench/actions\n[build-action-img]: https://github.com/aquasecurity/docker-bench/workflows/build/badge.svg\n[cov-img]: https://codecov.io/github/aquasecurity/docker-bench/branch/main/graph/badge.svg\n[cov]: https://codecov.io/github/aquasecurity/docker-bench\n[license-img]: https://img.shields.io/badge/License-Apache%202.0-blue.svg\n[license]: https://opensource.org/licenses/Apache-2.0\n[release-img]: https://img.shields.io/github/release/aquasecurity/docker-bench.svg\n[release]: https://github.com/aquasecurity/docker-bench/releases\n[release-action-img]: https://github.com/aquasecurity/docker-bench/workflows/release/badge.svg\n","funding_links":[],"categories":["Containers","蓝队工具"],"sub_categories":["Threat modelling","基线检测"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Faquasecurity%2Fdocker-bench","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Faquasecurity%2Fdocker-bench","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Faquasecurity%2Fdocker-bench/lists"}