{% extends "base.html" %} {% block title %}AUTARCH — Container Security{% endblock %} {% block content %}
Docker auditing, Kubernetes assessment, container image scanning, escape detection, and Dockerfile linting.
| Check | Severity | Status | Detail |
|---|---|---|---|
| Click "Audit Docker Host" to check daemon configuration and security. | |||
| Name | Image | Status | Ports | Actions |
|---|---|---|---|---|
| Click "Refresh Containers" to list Docker containers. | ||||
| Name | Status | Containers | Node | Restarts | Actions |
|---|---|---|---|---|---|
| Select a namespace and click "List Pods". | |||||
Check for overly permissive bindings and wildcard permissions
Find exposed and unencrypted secrets in the namespace
Verify NetworkPolicies exist and find unprotected pods
Scan container images for known CVEs using Trivy or Grype.
| Severity | CVE | Package | Installed | Fixed |
|---|---|---|---|---|
| Enter an image name and click "Scan Image" to find vulnerabilities. | ||||
| Repository | Tag | Size | Created | Actions |
|---|---|---|---|---|
| Click "Refresh Images" to list local Docker images. | ||||
Paste Dockerfile content below to check for security issues.
| Rule | Severity | Line | Issue | Detail |
|---|---|---|---|---|
| Paste a Dockerfile and click "Lint Dockerfile" to check for issues. | ||||