Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. DevSecOps
  3. Dagda

Dagda

Apache-2.0Python0.8.0

A tool for static vulnerability analysis and runtime monitoring of Docker images and containers to detect malware and anomalous activities.

GitHubGitHub
1.2k stars174 forks0 contributors

What is Dagda?

Dagda is an open-source tool that performs static analysis and runtime monitoring of Docker images and containers to enhance security. It scans for known vulnerabilities, malware, and other malicious threats in containerized applications, while also detecting anomalous activities during runtime. The tool helps developers and security teams identify and mitigate risks in their Docker deployments.

Target Audience

DevOps engineers, security professionals, and developers who build and deploy Docker containers and need to ensure their images and running containers are free from vulnerabilities and malicious code.

Value Proposition

Dagda provides a comprehensive, all-in-one solution for Docker security by combining static vulnerability scanning with runtime behavioral monitoring. Its integration with multiple vulnerability databases, malware detection engines, and real-time monitoring tools offers a unique, open-source alternative to proprietary container security platforms.

Overview

a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities

Use Cases

Best For

  • Scanning Docker images for known CVEs and security advisories before deployment
  • Detecting malware and trojans embedded within container layers
  • Monitoring production Docker containers for suspicious runtime behavior
  • Securing CI/CD pipelines by integrating vulnerability checks into build processes
  • Auditing Docker environments for compliance and security best practices
  • Analyzing dependencies in multi-language applications (Java, Python, Node.js, etc.) within containers

Not Ideal For

  • Teams needing rapid, sub-minute vulnerability scans in CI/CD pipelines due to slow database population and analysis times
  • Organizations using Kubernetes or other container orchestrators that require native, cluster-wide security tooling
  • Environments with minimal infrastructure where installing MongoDB, kernel headers, and Falco dependencies is prohibitive
  • Projects requiring commercial support, SLAs, or vendor-backed security guarantees

Pros & Cons

Pros

Comprehensive Vulnerability Sources

Aggregates CVE, Bugtraq, Red Hat advisories, and exploits from Offensive Security into a MongoDB database, providing a wide net for static analysis as detailed in the database contents section.

Multi-Language Dependency Analysis

Uses OWASP Dependency Check and Retire.js to scan dependencies in Java, Python, Node.js, JavaScript, Ruby, and PHP, covering diverse application stacks within containers.

Integrated Runtime Monitoring

Leverages Falco for real-time detection of anomalous activities in running containers, with example outputs showing warnings for unexpected setuid calls, enhancing runtime security.

Malware Detection with ClamAV

Incorporates ClamAV antivirus engine to identify trojans, viruses, and malware in Docker images, as demonstrated in static analysis results with specific malware binaries listed.

Unified History and Reporting

Stores all analysis reports in MongoDB, allowing searchable history of Docker images and containers, which aids in auditing and compliance efforts.

Cons

Complex Initial Setup

Requires installation of MongoDB, kernel headers, Falco, and potentially Sysdig, with troubleshooting needed for kernel header errors, making deployment cumbersome compared to drop-in tools.

Slow Performance Overhead

Initial database population with vuln --init can take several minutes, and static analysis is time-consuming, which may bottleneck fast-paced development workflows.

Docker-Centric Limitations

Focused solely on Docker daemon and containers, lacking native support for other runtimes or orchestration platforms like Kubernetes, limiting its applicability in modern cloud environments.

Manual Updates and Maintenance

Vulnerability database updates require manual reruns of vuln --init, and the README notes potential issues with kernel headers and Sysdig, adding operational overhead.

Frequently Asked Questions

Quick Stats

Stars1,228
Forks174
Contributors0
Open Issues16
Last commit2 years ago
CreatedSince 2016

Tags

#vulnerabilities#container-monitoring#runtime-security#docker-security#malware-detection#clamav#security#devsecops#vulnerability-scanning#falco#mongodb#docker#static-analysis

Built With

C
ClamAV
M
MongoDB
P
Python
F
Flask
D
Docker

Included in

DevSecOps1.7k
Auto-fetched 1 day ago

Related Projects

trivytrivy

Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

Stars34,718
Forks321
Last commit4 days ago
GrypeGrype

A vulnerability scanner for container images and filesystems

Stars12,093
Forks790
Last commit3 days ago
hadolinthadolint

Dockerfile linter, validate inline bash, written in Haskell

Stars12,081
Forks491
Last commit5 days ago
ClairClair

Vulnerability Static Analysis for Containers

Stars10,971
Forks1,200
Last commit3 days ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub