home / skills / jeremylongshore / claude-code-plugins-plus-skills / container-security-scanner
This skill analyzes container images and running containers for vulnerabilities using Trivy and Snyk, delivering actionable remediation guidance.
npx playbooks add skill jeremylongshore/claude-code-plugins-plus-skills --skill container-security-scannerReview the files below or copy the command above to add this skill to your agents.
---
name: scanning-container-security
description: |
This skill enables Claude to scan container images and running containers for vulnerabilities using tools like Trivy and Snyk. It identifies potential security risks in container environments. Use this skill when the user requests a security assessment of a container image, asks to identify vulnerabilities in a container, or wants to improve the security posture of their containerized applications. Trigger terms include "scan container," "container security," "vulnerability assessment," "Trivy scan," or "Snyk scan."
---
## Overview
This skill empowers Claude to perform comprehensive security scans of container images and running containers. By leveraging industry-standard tools, it identifies vulnerabilities and provides insights for remediation, enhancing the overall security of containerized applications.
## How It Works
1. **Receiving Request**: Claude receives a user request to scan a container for vulnerabilities.
2. **Executing Scan**: Claude utilizes tools like Trivy or Snyk to perform the security scan on the specified container image or running container.
3. **Reporting Results**: Claude presents a detailed report of identified vulnerabilities, including severity levels and potential remediation steps.
## When to Use This Skill
This skill activates when you need to:
- Assess the security of a container image before deployment.
- Identify vulnerabilities in a running container within a production environment.
- Generate a security report for compliance purposes.
## Examples
### Example 1: Pre-Deployment Security Check
User request: "Scan this Docker image for vulnerabilities before I deploy it: myapp:latest"
The skill will:
1. Initiate a Trivy scan on the `myapp:latest` Docker image.
2. Return a report listing all identified vulnerabilities, their severity, and suggested fixes.
### Example 2: Runtime Container Security Assessment
User request: "Scan the running container with ID abc123xyz for security vulnerabilities."
The skill will:
1. Execute a Snyk scan on the container with ID `abc123xyz`.
2. Provide a report detailing any vulnerabilities found in the running container, along with remediation advice.
## Best Practices
- **Specify Image Name**: Always provide the full image name (including tag) for accurate scanning.
- **Review Severity Levels**: Pay close attention to high and critical severity vulnerabilities and address them promptly.
- **Regular Scanning**: Schedule regular container security scans to detect new vulnerabilities as they are discovered.
## Integration
This skill can be integrated with other CI/CD pipeline tools to automate security checks as part of the deployment process. It also provides data that can be used with reporting and dashboarding tools to visualize security posture over time.This skill enables Claude to scan container images and running containers for security vulnerabilities using tools like Trivy and Snyk. It produces prioritized findings with severity levels and actionable remediation suggestions to improve the security posture of containerized applications. Use it to validate images before deployment or to assess running containers in CI/CD and production environments.
When a scan request is received, the skill invokes container-scanning tools (for example, Trivy for image scans or Snyk for runtime/container scans) against the specified image name or container ID. It parses the tool output to extract vulnerabilities, severity, affected packages, and suggested fixes, then compiles a concise report. The report highlights critical/high issues first and includes guidance for remediation and follow-up scanning.
Which scanners does this skill use?
It uses industry-standard tools such as Trivy for image scanning and Snyk for deeper dependency/runtime analysis, configurable per request.
Can the skill fix vulnerabilities automatically?
No. The skill provides remediation guidance and prioritized actions but does not automatically patch images or containers; you should rebuild images or apply fixes in your environment.