Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. Cybersecurity Blue Team
  3. Bane

Bane

MITGov0.4.4

A custom AppArmor profile generator for Docker containers that simplifies security configuration.

GitHubGitHub
1.2k stars91 forks0 contributors

What is Bane?

Bane is a custom AppArmor profile generator for Docker containers. It automates the creation of security profiles that restrict container capabilities, file access, and network operations. The tool solves the problem of manually writing complex AppArmor profiles, making container security more manageable and less error-prone.

Target Audience

System administrators, DevOps engineers, and security professionals who deploy Docker containers and need to enforce strict security policies using AppArmor.

Value Proposition

Developers choose Bane because it simplifies AppArmor profile generation with a declarative configuration, reducing manual effort and potential security gaps. Its seamless Docker integration and automatic installation make it a practical tool for hardening containerized applications.

Overview

Custom & better AppArmor profile generator for Docker containers.

Use Cases

Best For

  • Generating AppArmor profiles for Docker containers without manual coding
  • Restricting container capabilities and file system access in production environments
  • Auditing and logging write operations within secured containers
  • Hardening web servers like Nginx running in Docker
  • Implementing least-privilege security models for containerized applications
  • Automating security profile deployment in CI/CD pipelines

Not Ideal For

  • Teams using SELinux or other mandatory access control systems instead of AppArmor
  • Environments requiring dynamic, runtime-modifiable security policies for containers
  • Projects integrated with Kubernetes or other orchestrators needing out-of-the-box security profile management

Pros & Cons

Pros

Declarative Configuration

Uses a simple TOML file to define permissions, as shown in sample.toml, eliminating the need to write complex AppArmor syntax manually.

Automatic Profile Installation

Installs generated profiles directly into `/etc/apparmor.d/containers/` and runs `apparmor_parser`, streamlining deployment without manual steps.

Seamless Docker Integration

Profiles are designed to work with Docker's `--security-opt` flag, making it easy to apply security to containers, as demonstrated in the usage examples.

Audit Logging Support

Includes `LogOnWritePaths` to log write operations, with sample dmesg output provided, aiding in monitoring and debugging security events.

Cons

Limited to AppArmor and Docker

Bane only generates AppArmor profiles and is tailored for Docker, making it unsuitable for SELinux systems or other container runtimes like Podman without adaptation.

Static Profile Generation

Profiles are generated from static TOML files and require regeneration for changes, lacking support for dynamic policy updates during container runtime.

Requires Root Privileges

Installation and profile application require sudo/root access, which can complicate deployment in automated or restricted environments, as noted in the installation commands.

Frequently Asked Questions

Quick Stats

Stars1,226
Forks91
Contributors0
Open Issues3
Last commit5 years ago
CreatedSince 2015

Tags

#container-security#devops#docker-security#apparmor#security-hardening#security#system-administration#linux-security#docker#cli#linux#opencontainers#containers#go

Built With

G
Go

Included in

Docker35.8kCybersecurity Blue Team5.2k
Auto-fetched 18 hours ago

Related Projects

trivytrivy

Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

Stars34,748
Forks326
Last commit5 days ago
GrypeGrype

A vulnerability scanner for container images and filesystems

Stars12,103
Forks792
Last commit5 days ago
ClairClair

Vulnerability Static Analysis for Containers

Stars10,971
Forks1,199
Last commit2 days ago
clairclair

Vulnerability Static Analysis for Containers

Stars10,971
Forks1,199
Last commit2 days ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub