scanning-container-security
关于
This skill enables Claude to scan container images for security vulnerabilities using tools like Trivy and Snyk. It identifies security risks to help improve the security posture of containerized applications. Use it when a developer requests a vulnerability assessment or security scan of a container.
快速安装
Claude Code
推荐/plugin add https://github.com/jeremylongshore/claude-code-plugins-plusgit clone https://github.com/jeremylongshore/claude-code-plugins-plus.git ~/.claude/skills/scanning-container-security在 Claude Code 中复制并粘贴此命令以安装该技能
技能文档
Overview
This skill empowers Claude to perform comprehensive security scans of container images and running containers. By leveraging industry-standard tools, it identifies vulnerabilities and provides insights for remediation, enhancing the overall security of containerized applications.
How It Works
- Receiving Request: Claude receives a user request to scan a container for vulnerabilities.
- Executing Scan: Claude utilizes tools like Trivy or Snyk to perform the security scan on the specified container image or running container.
- Reporting Results: Claude presents a detailed report of identified vulnerabilities, including severity levels and potential remediation steps.
When to Use This Skill
This skill activates when you need to:
- Assess the security of a container image before deployment.
- Identify vulnerabilities in a running container within a production environment.
- Generate a security report for compliance purposes.
Examples
Example 1: Pre-Deployment Security Check
User request: "Scan this Docker image for vulnerabilities before I deploy it: myapp:latest"
The skill will:
- Initiate a Trivy scan on the
myapp:latestDocker image. - Return a report listing all identified vulnerabilities, their severity, and suggested fixes.
Example 2: Runtime Container Security Assessment
User request: "Scan the running container with ID abc123xyz for security vulnerabilities."
The skill will:
- Execute a Snyk scan on the container with ID
abc123xyz. - Provide a report detailing any vulnerabilities found in the running container, along with remediation advice.
Best Practices
- Specify Image Name: Always provide the full image name (including tag) for accurate scanning.
- Review Severity Levels: Pay close attention to high and critical severity vulnerabilities and address them promptly.
- Regular Scanning: Schedule regular container security scans to detect new vulnerabilities as they are discovered.
Integration
This skill can be integrated with other CI/CD pipeline tools to automate security checks as part of the deployment process. It also provides data that can be used with reporting and dashboarding tools to visualize security posture over time.
GitHub 仓库
相关推荐技能
sglang
元SGLang是一个专为LLM设计的高性能推理框架,特别适用于需要结构化输出的场景。它通过RadixAttention前缀缓存技术,在处理JSON、正则表达式、工具调用等具有重复前缀的复杂工作流时,能实现极速生成。如果你正在构建智能体或多轮对话系统,并追求远超vLLM的推理性能,SGLang是理想选择。
evaluating-llms-harness
测试该Skill通过60+个学术基准测试(如MMLU、GSM8K等)评估大语言模型质量,适用于模型对比、学术研究及训练进度追踪。它支持HuggingFace、vLLM和API接口,被EleutherAI等行业领先机构广泛采用。开发者可通过简单命令行快速对模型进行多任务批量评估。
langchain
元LangChain是一个用于构建LLM应用程序的框架,支持智能体、链和RAG应用开发。它提供多模型提供商支持、500+工具集成、记忆管理和向量检索等核心功能。开发者可用它快速构建聊天机器人、问答系统和自主代理,适用于从原型验证到生产部署的全流程。
llamaguard
其他LlamaGuard是Meta推出的7-8B参数内容审核模型,专门用于过滤LLM的输入和输出内容。它能检测六大安全风险类别(暴力/仇恨、性内容、武器、违禁品、自残、犯罪计划),准确率达94-95%。开发者可通过HuggingFace、vLLM或Sagemaker快速部署,并能与NeMo Guardrails集成实现自动化安全防护。
