EN
ENNA

Dockle vs Trivy

GitHub Stats

3.2k
Stars
34.4k
162
Forks
238
41
Issues
247
3d ago
Updated
4d ago
Apache-2.0
License
Apache-2.0
Go
Language
Go

About Dockle

Dockle is a container image linter for security, helping build the best practice Docker/OCI image. It checks built container images for security issues and best practice violations based on the CIS Docker Benchmark and additional security checks. Unlike Dockerfile linters that only analyze the build instructions, Dockle inspects the actual built image, catching issues like credentials left in image layers, unnecessary setuid/setgid binaries, missing USER directives (running as root), writable executables, and unused environment variables containing secrets. Dockle outputs clear, actionable findings with severity levels (FATAL, WARN, INFO) and references to CIS benchmark sections. It integrates easily into CI/CD pipelines, supports JSON output for automation, and can be configured with an ignore file for accepted risks. Dockle fills the gap between Dockerfile linting (like Hadolint) and runtime scanning (like Falco).

About Trivy

Trivy is a comprehensive vulnerability scanner capable of analyzing containers, filesystems, git repositories, and Kubernetes configurations. It generates Software Bill of Materials (SBOM) and identifies vulnerabilities by matching known CVEs against the scanned components. Designed for ease of use, Trivy integrates seamlessly into CI/CD pipelines, enabling continuous security assessments. Its broad coverage and support for multiple formats make it a versatile tool for maintaining security across diverse environments.

Platform Support

๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows
๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows

Tags

Dockle only

dockerlintercis-benchmarkbest-practicesci-cdimage-scanning

Trivy only

container-securitysbomvulnerability-scanneriac-scanning