Tags
dockerdockerfilecmdcorrectnessconfigurationmaintainabilityconfusinganti-pattern
CWE References
Interactive Playground
Experiment with the vulnerable code and security rule below. Edit the code to see how the rule detects different vulnerability patterns.
pathfinder scan --ruleset docker/DOCKER-COR-003 --project .1
2
3
4
5
6
rule.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
About This Rule
Understanding the vulnerability and how it is detected
Detects Dockerfiles with multiple CMD instructions. Docker only honors the last CMD, making earlier ones misleading and potentially causing unexpected runtime behavior. This can lead to confusion and bugs.
How to Fix
Recommended remediation steps
- 1Review your Dockerfile to address the multiple cmd instructions issue
- 2Follow Docker official best practices for image building
- 3Use docker build --check to validate Dockerfile syntax and best practices
References
External resources and documentation
Similar Rules
Explore related security rules for Docker
Frequently Asked Questions
Common questions about Multiple CMD Instructions
Multiple CMD instructions detected. Only the last one takes effect.
Review the secure code example in the playground above and apply the recommended pattern to your Dockerfile or docker-compose.yml.
New feature
Get these findings posted directly on your GitHub pull requests
The Multiple CMD Instructions rule runs in CI and posts inline review comments on the exact lines — no dashboard, no SARIF viewer.