EN
ENNA

Dockle vs Grype

GitHub Stats

3.2k
Stars
11.9k
162
Forks
774
41
Issues
394
3d ago
Updated
4d ago
Apache-2.0
License
Apache-2.0
Go
Language
Go

About Dockle

Dockle is a container image linter for security, helping build the best practice Docker/OCI image. It checks built container images for security issues and best practice violations based on the CIS Docker Benchmark and additional security checks. Unlike Dockerfile linters that only analyze the build instructions, Dockle inspects the actual built image, catching issues like credentials left in image layers, unnecessary setuid/setgid binaries, missing USER directives (running as root), writable executables, and unused environment variables containing secrets. Dockle outputs clear, actionable findings with severity levels (FATAL, WARN, INFO) and references to CIS benchmark sections. It integrates easily into CI/CD pipelines, supports JSON output for automation, and can be configured with an ignore file for accepted risks. Dockle fills the gap between Dockerfile linting (like Hadolint) and runtime scanning (like Falco).

About Grype

Grype is a vulnerability scanner for container images and filesystems that identifies known vulnerabilities by matching installed packages against CVE databases. It provides detailed reports and integrates with SBOM to enhance software supply chain security. Grype's capabilities in scanning and its focus on container security make it an essential tool for DevOps teams and security professionals. Its support for multiple image formats and package managers broadens its applicability in modern development workflows.

Platform Support

๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows
๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows

Tags

Shared

image-scanning

Dockle only

dockerlintercis-benchmarkbest-practicesci-cd

Grype only

container-securitycve-scanningsbom