Container Security
Security rules for Docker Compose services
Run All Container Security Rules
pathfinder scan --ruleset cpf/docker-compose/securityRules
Dangerous Capability Added
highDetects services that add dangerous Linux capabilities like SYS_ADMIN, SYS_MODULE, or SYS_PTRACE which can be used for container escape or privilege escalation.
Docker Socket Exposed to Container
criticalDetects services that mount the Docker socket, giving the container full control over the Docker daemon, equivalent to unrestricted root access to the host.
Using Host IPC Mode
mediumDetects services using host IPC namespace, allowing the container to share shared memory segments, semaphores, and message queues with the host system.
Using Host Network Mode
highDetects services using host network mode, which disables network isolation and makes the container share the host's network stack, bypassing Docker's network isolation.
Using Host PID Mode
highDetects services using host PID namespace, allowing the container to see and interact with all processes running on the host system.
Service Running in Privileged Mode
criticalDetects services configured with privileged mode, which disables almost all container security features and grants nearly all capabilities of the host machine.
Seccomp Confinement Disabled
highDetects services with seccomp disabled, allowing containers to use all system calls and significantly increasing the attack surface.
Container Filesystem is Writable
lowDetects services without read-only filesystem, which allows attackers to modify binaries, install malware, or persist backdoors within the container.
Missing no-new-privileges Security Option
mediumDetects services without no-new-privileges security option, which allows processes to gain additional privileges via setuid/setgid binaries.
SELinux Separation Disabled
mediumDetects services that explicitly disable SELinux separation, removing a critical mandatory access control security layer.