Snyk is an editor specializing in analyzing vulnerabilities in the code of infrastructure configuration files, including those present in containers and application packages.

Snyk offers a cloud platform first, but it offers various products.

Synk OpenSource integrates through the editor’s CLI into a Git flow. Once launched, the software detects vulnerabilities, classifies them by degree of sensitivity, and automatically corrects known security errors. This functionality can be incorporated into the pull request cycle in order to apply to code sent to repositories.

Snyk Infrastructure as Code, on the other hand, analyzes the vulnerabilities and fixes them in the JSON and YAML Kubernetes configuration files. Here, a rules engine allows you to configure the sensitivity of detections within Git repositories according to the parameters decided by the administrators.

Snyk Container allows you to test docker images and associated registries at the time of their creation and after. The program can be integrated into CLIs, SCMs, CI tools, container registries, and Kubernetes.

Easiest Way to Find Vulnerabilities in Docker Images Using Snyk DevOps Sysadmin

Today, we will see how we can use Synk Container, which comes built-in with Docker to detect vulnerabilities.

Sample docker file

The first thing that you need for using Synk to detect vulnerabilities is a docker image. In this example, we will be using the following docker image :

FROM python:3.4-alpine
ADD . /code
WORKDIR /code
RUN pip install -r requirements.txt
EXPOSE 8000 CMD
[“python”, “app.py”]

The first thing we must do is generate the image locally through the following command:

docker build -t 0xyz0/python-app.

Now we have an image to analyze.

Scan the image from the Docker client

The integration of the Snyk service with Docker makes this process incredibly simple. To start the scan, you just have to execute the following:

docker scan 0***0/python-app

This will start with the analysis where it will return a more or less extensive output, depending on the vulnerabilities it finds, and with a final summary:

Easiest Way to Find Vulnerabilities in Docker Images Using Snyk DevOps Sysadmin
Docker scan shows all the vulnerabilities of the image  

As you can see, it not only tells you how many vulnerabilities it has found. Even if you scroll up, you can see what they are and their criticality, but it also makes recommendations regarding the base image you should use.

You can also check the details of the vulnerability from the Snyk Vulnerability Database.

In my case, it offers me several alternatives, so I am going to modify my Dockerfile with the first option:

FROM python:3.7.11-slim

ADD . /code

WORKDIR /code

RUN pip install -r requirements.txt

EXPOSE 8000

CMD ["python", "app.py"]

If I rebuild the image and scan it:

docker build -t 0***0/python-app . && docker scan 0***0/python-app

You will see that the output now shows fewer vulnerabilities, and in this case, it tells you that you are currently using the more secure base image:

Easiest Way to Find Vulnerabilities in Docker Images Using Snyk DevOps Sysadmin
Docker scan ensures that you are using the most secure base image

You can also get a more detailed report if you add the docker file that generates the image to the command:

docker scan -f Dockerfile 0***0/python-app

And even exclude the base image from the analysis, just in case you want to focus on what you have done wrong:

docker scan -f Dockerfile --exclude-base 0***0/python-app

This service can also be integrated with the Docker Hub repositories:

Easiest Way to Find Vulnerabilities in Docker Images Using Snyk DevOps Sysadmin

But for this, you must have one of the paid subscriptions. However, you can launch it locally, with the free plan that you have just for being logged in to Docker Hub (it has clear scanning limits), while you develop or want to check how secure is a third-party image that you want to use.

Using Synx with Github Actions

The first thing to do is create a repository and inside create a folder.

.github / worflows /

Next, to use Synx Container in Github is to create a new image or take that image we created in Docker Hub. To use Snyk, you have to create a new secret called SNYK_TOKEN, and to obtain the token, you have to create an account at Snyk. From General Settings, where it says API Token, you can quickly generate it.

With the token, you can create the secret on Github and use it in the Action. Now, you have to pass it the name of the repository that was created in Docker Hub. Next, you have to pass the message it has to send. You can access the outputs of the steps to use as a variable in the message.

with:
args: 'A new commit has been pushed. Please verify github action:
| worflow $ {{fromJson (steps.repo.outputs.result) .html_url}} / actions
| Exec: $ {{steps.prep.outputs.created}}
| Version: $ {{steps.prep.outputs.version}} '

How to run the entire workflow? Simple just by pushing Master. Github Action will detect the file inside .github / workflows /.

Final Words 👈

With the increasing popularity of containers, the incidents of security breaches are becoming more and more common, most of which are due to the misconfiguration errors in the deployment of the containers. Synk provides an efficient and straightforward tool that can help us avoid misconfiguration errors and detect the most common vulnerabilities in docker images.