Interactive Playground
Experiment with the vulnerable code and security rule below. Edit the code to see how the rule detects different vulnerability patterns.
pathfinder scan --ruleset docker/DOCKER-BP-008 --project .About This Rule
Understanding the vulnerability and how it is detected
This rule detects RUN instructions using `pip install` without the `--no-cache-dir` flag. By default, pip caches downloaded packages and wheels in `~/.cache/pip/`, which can add 50-200 MB to Docker images. The --no-cache-dir flag disables caching, significantly reducing image size for Python applications.
How to Fix
Recommended remediation steps
- 1Review your Dockerfile to address the pip install without --no-cache-dir issue
- 2Follow Docker official best practices for image building
- 3Use docker build --check to validate Dockerfile syntax and best practices
References
External resources and documentation
Similar Rules
Explore related security rules for Docker
Base Image Uses :latest Tag
Base image uses ':latest' tag or no tag (defaults to latest). This makes builds non-reproducible.
Deprecated MAINTAINER Instruction
MAINTAINER instruction is deprecated. Use LABEL org.opencontainers.image.authors instead.
apt-get Without --no-install-recommends
apt-get install without --no-install-recommends. This installs unnecessary packages, increasing image size and attack surface.
Frequently Asked Questions
Common questions about pip install Without --no-cache-dir
New feature
Get these findings posted directly on your GitHub pull requests
The pip install Without --no-cache-dir rule runs in CI and posts inline review comments on the exact lines — no dashboard, no SARIF viewer.