This repository contains the results of a Trickest workflow that performs a collection of multiple types of security checks and vulnerability tests on DockerHub's top 100 most downloaded images. The tests include (but are not limited to):
- Checking for the usage of outdated software with known exploits
- Searching for developer tools installed
- Getting the base OS
cat
ing the/etc/passwd
and/etc/shadow
in search for blank passwords- Finding files owned by root user
- Searching for
guid
andsuid
executables - Searching for hidden files, package names, world writable files and folders
- Enumerating password policies and SSL sertificates
- Enumeration of GTFOBins
- Scanning for open ports
- Add your own tests!
A Trickest workflow collects a list of DockerHub's most used images and their tags. Then it uses a collection of custom scripts and a couple of open-source tools like trivy to get an overview of each image's security posture and overall attack surface.
- We start by enumerating a list of the most popular images from DockerHub - this step can be modified to pull images from other (potentially private) image repositories as well.
- Once collected, Trickest's Docker-in-Docker integration is used to pull all tags of each image.
- Then a series of tests are run on each image:
- Trivy is used to find outdated software (thanks aquasecurity!)
- 💡 Tip: CVEs repository is hyperlinked for CVEs that have POCs!
- A few shell scripts are also included to carry out other tests and collect other data (Contributions are welcome!)
- Trivy is used to find outdated software (thanks aquasecurity!)
- In the end, each test's results are written to a simple report and pushed to this repository.
- As with most of our previous projects, this workflow is scheduled to run constantly and always have up-to-date results.
All contributions/ideas/suggestions are welcome! Feel free to create a new ticket via GitHub issues, tweet at us @trick3st, or join the conversation on Discord.
We believe in the value of tinkering. Sign up for an access or visit trickest.com to customize this workflow to your use case, get access to many more workflows, or build your own from scratch!