Back to Skills

scanning-container-security

jeremylongshore
Updated Yesterday
14 views
712
74
712
View on GitHub
Metaai

About

This skill enables Claude to scan container images and running containers for vulnerabilities using tools like Trivy and Snyk. Use it when a developer requests a security assessment, needs to identify vulnerabilities, or wants to improve their container security posture. It's triggered by terms like "scan container," "container security," or "vulnerability assessment."

Quick Install

Claude Code

Recommended
Plugin CommandRecommended
/plugin add https://github.com/jeremylongshore/claude-code-plugins-plus
Git CloneAlternative
git clone https://github.com/jeremylongshore/claude-code-plugins-plus.git ~/.claude/skills/scanning-container-security

Copy and paste this command in Claude Code to install this skill

Documentation

Overview

This skill empowers Claude to perform comprehensive security scans of container images and running containers. By leveraging industry-standard tools, it identifies vulnerabilities and provides insights for remediation, enhancing the overall security of containerized applications.

How It Works

  1. Receiving Request: Claude receives a user request to scan a container for vulnerabilities.
  2. Executing Scan: Claude utilizes tools like Trivy or Snyk to perform the security scan on the specified container image or running container.
  3. Reporting Results: Claude presents a detailed report of identified vulnerabilities, including severity levels and potential remediation steps.

When to Use This Skill

This skill activates when you need to:

  • Assess the security of a container image before deployment.
  • Identify vulnerabilities in a running container within a production environment.
  • Generate a security report for compliance purposes.

Examples

Example 1: Pre-Deployment Security Check

User request: "Scan this Docker image for vulnerabilities before I deploy it: myapp:latest"

The skill will:

  1. Initiate a Trivy scan on the myapp:latest Docker image.
  2. Return a report listing all identified vulnerabilities, their severity, and suggested fixes.

Example 2: Runtime Container Security Assessment

User request: "Scan the running container with ID abc123xyz for security vulnerabilities."

The skill will:

  1. Execute a Snyk scan on the container with ID abc123xyz.
  2. Provide a report detailing any vulnerabilities found in the running container, along with remediation advice.

Best Practices

  • Specify Image Name: Always provide the full image name (including tag) for accurate scanning.
  • Review Severity Levels: Pay close attention to high and critical severity vulnerabilities and address them promptly.
  • Regular Scanning: Schedule regular container security scans to detect new vulnerabilities as they are discovered.

Integration

This skill can be integrated with other CI/CD pipeline tools to automate security checks as part of the deployment process. It also provides data that can be used with reporting and dashboarding tools to visualize security posture over time.

GitHub Repository

jeremylongshore/claude-code-plugins-plus
Path: backups/skills-migration-20251108-070147/plugins/devops/container-security-scanner/skills/container-security-scanner
aiautomationclaude-codedevopsmarketplacemcp

Related Skills

sglang

Meta

SGLang is a high-performance LLM serving framework that specializes in fast, structured generation for JSON, regex, and agentic workflows using its RadixAttention prefix caching. It delivers significantly faster inference, especially for tasks with repeated prefixes, making it ideal for complex, structured outputs and multi-turn conversations. Choose SGLang over alternatives like vLLM when you need constrained decoding or are building applications with extensive prefix sharing.

View skill

evaluating-llms-harness

Testing

This Claude Skill runs the lm-evaluation-harness to benchmark LLMs across 60+ standardized academic tasks like MMLU and GSM8K. It's designed for developers to compare model quality, track training progress, or report academic results. The tool supports various backends including HuggingFace and vLLM models.

View skill

llamaguard

Other

LlamaGuard is Meta's 7-8B parameter model for moderating LLM inputs and outputs across six safety categories like violence and hate speech. It offers 94-95% accuracy and can be deployed using vLLM, Hugging Face, or Amazon SageMaker. Use this skill to easily integrate content filtering and safety guardrails into your AI applications.

View skill

langchain

Meta

LangChain is a framework for building LLM applications using agents, chains, and RAG pipelines. It supports multiple LLM providers, offers 500+ integrations, and includes features like tool calling and memory management. Use it for rapid prototyping and deploying production systems like chatbots, autonomous agents, and question-answering services.

View skill