Interactive Playground
Experiment with the vulnerable code and security rule below. Edit the code to see how the rule detects different vulnerability patterns.
pathfinder scan --ruleset docker/DOCKER-BP-014 --project .About This Rule
Understanding the vulnerability and how it is detected
Detects 'apt-get install' without removing /var/lib/apt/lists/*. Package lists contain repository metadata that is not needed at runtime and wastes space. This is specific to Debian/Ubuntu based images.
How to Fix
Recommended remediation steps
- 1Use apt-get instead of apt in Dockerfiles for stable CLI behavior
- 2Always run apt-get update && apt-get install in the same RUN instruction
- 3Add --no-install-recommends to minimize installed packages
- 4Clean up with rm -rf /var/lib/apt/lists/* in the same layer
References
External resources and documentation
Similar Rules
Explore related security rules for Docker
Base Image Uses :latest Tag
Base image uses ':latest' tag or no tag (defaults to latest). This makes builds non-reproducible.
Deprecated MAINTAINER Instruction
MAINTAINER instruction is deprecated. Use LABEL org.opencontainers.image.authors instead.
apt-get Without --no-install-recommends
apt-get install without --no-install-recommends. This installs unnecessary packages, increasing image size and attack surface.
Frequently Asked Questions
Common questions about Remove apt Package Lists
New feature
Get these findings posted directly on your GitHub pull requests
The Remove apt Package Lists rule runs in CI and posts inline review comments on the exact lines — no dashboard, no SARIF viewer.