Interactive Playground
Experiment with the vulnerable code and security rule below. Edit the code to see how the rule detects different vulnerability patterns.
pathfinder scan --ruleset docker/DOCKER-BP-005 --project .About This Rule
Understanding the vulnerability and how it is detected
This rule detects RUN instructions that use `apt-get install` without the `--no-install-recommends` flag. By default, apt installs both required packages and "recommended" packages, which are often unnecessary and significantly bloat Docker images, increasing attack surface and build/deploy times.
Security Implications
Potential attack scenarios if this vulnerability is exploited
Supply Chain Risks
Recommended packages may pull in: - Unmaintained dependencies - Packages from less-trusted sources - Transitive dependencies with vulnerabilities
Compliance Issues
- More packages = more licenses to track - Harder to maintain Software Bill of Materials (SBOM) - Difficult to audit all dependencies
How to Fix
Recommended remediation steps
- 1Use apt-get instead of apt in Dockerfiles for stable CLI behavior
- 2Always run apt-get update && apt-get install in the same RUN instruction
- 3Add --no-install-recommends to minimize installed packages
- 4Clean up with rm -rf /var/lib/apt/lists/* in the same layer
References
External resources and documentation
Similar Rules
Explore related security rules for Docker
Base Image Uses :latest Tag
Base image uses ':latest' tag or no tag (defaults to latest). This makes builds non-reproducible.
Deprecated MAINTAINER Instruction
MAINTAINER instruction is deprecated. Use LABEL org.opencontainers.image.authors instead.
Avoid apt-get upgrade
Avoid apt-get upgrade in Dockerfiles. Use specific base image versions instead.
Frequently Asked Questions
Common questions about apt-get Without --no-install-recommends
New feature
Get these findings posted directly on your GitHub pull requests
The apt-get Without --no-install-recommends rule runs in CI and posts inline review comments on the exact lines — no dashboard, no SARIF viewer.