HomeTools › Dockerfile Linter
Free Tool · Original

Dockerfile Security Linter

18 security rules from the CIS Docker Benchmark and Liz Rice's Container Security (O'Reilly, 2nd ed.). We flag root users, :latest tags, secrets in ENV, curl-piped installs, and every other classic footgun.

Dockerfile
Security analysis
Paste a Dockerfile on the left to see findings.
100% client-side. Rules run entirely in your browser. We never transmit your Dockerfile. No backend, no logs, no telemetry.

What this linter catches

Dockerfile security is dominated by a small number of recurring mistakes — ones that ship images running as root, leak secrets into layer history, or pull in arbitrary code from the internet at build time. This tool encodes 18 of them as deterministic checks.

The rule catalog

Every rule has a stable ID so you can reference it in code review or in issue trackers.

What it does not do

This is a static linter, not a vulnerability scanner. It does not know whether node:20-alpine has a published CVE — for that you need a database-backed image scanner. Security Factor 365 includes an image scanner that cross-references every base image and RUN apt-get install package against OSV.dev, GHSA, and OSV's malicious-packages feed. It also runs 10 additional scanner engines (SAST, SCA, DAST, IAST, IaC, Secrets, Config, API, AI Security, 12-Factor IaC) on every commit.

References

Scan every image on every commit, automatically

SF365's Container scanner runs these 18 rules plus image-level CVE analysis, SBOM generation (SPDX + CycloneDX), and OpenSSF malicious-package lookup on every build, merge, and release.

Start Free Trial →