A tool for static vulnerability analysis and runtime monitoring of Docker images and containers to detect malware and anomalous activities.
Dagda is an open-source tool that performs static analysis and runtime monitoring of Docker images and containers to enhance security. It scans for known vulnerabilities, malware, and other malicious threats in containerized applications, while also detecting anomalous activities during runtime. The tool helps developers and security teams identify and mitigate risks in their Docker deployments.
DevOps engineers, security professionals, and developers who build and deploy Docker containers and need to ensure their images and running containers are free from vulnerabilities and malicious code.
Dagda provides a comprehensive, all-in-one solution for Docker security by combining static vulnerability scanning with runtime behavioral monitoring. Its integration with multiple vulnerability databases, malware detection engines, and real-time monitoring tools offers a unique, open-source alternative to proprietary container security platforms.
a tool to perform static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in docker images/containers and to monitor the docker daemon and running docker containers for detecting anomalous activities
Aggregates CVE, Bugtraq, Red Hat advisories, and exploits from Offensive Security into a MongoDB database, providing a wide net for static analysis as detailed in the database contents section.
Uses OWASP Dependency Check and Retire.js to scan dependencies in Java, Python, Node.js, JavaScript, Ruby, and PHP, covering diverse application stacks within containers.
Leverages Falco for real-time detection of anomalous activities in running containers, with example outputs showing warnings for unexpected setuid calls, enhancing runtime security.
Incorporates ClamAV antivirus engine to identify trojans, viruses, and malware in Docker images, as demonstrated in static analysis results with specific malware binaries listed.
Stores all analysis reports in MongoDB, allowing searchable history of Docker images and containers, which aids in auditing and compliance efforts.
Requires installation of MongoDB, kernel headers, Falco, and potentially Sysdig, with troubleshooting needed for kernel header errors, making deployment cumbersome compared to drop-in tools.
Initial database population with vuln --init can take several minutes, and static analysis is time-consuming, which may bottleneck fast-paced development workflows.
Focused solely on Docker daemon and containers, lacking native support for other runtimes or orchestration platforms like Kubernetes, limiting its applicability in modern cloud environments.
Vulnerability database updates require manual reruns of vuln --init, and the README notes potential issues with kernel headers and Sysdig, adding operational overhead.
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
A vulnerability scanner for container images and filesystems
Dockerfile linter, validate inline bash, written in Haskell
Vulnerability Static Analysis for Containers
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.