home / skills / jeremylongshore / claude-code-plugins-plus-skills / scanning-container-security
/plugins/devops/container-security-scanner/skills/scanning-container-security
This skill helps you assess, design, and automate container security tasks with guided scanning and compliance checks.
npx playbooks add skill jeremylongshore/claude-code-plugins-plus-skills --skill scanning-container-securityReview the files below or copy the command above to add this skill to your agents.
---
name: scanning-container-security
description: |
Execute use when you need to work with security and compliance.
This skill provides security scanning and vulnerability detection with comprehensive guidance and automation.
Trigger with phrases like "scan for vulnerabilities", "implement security controls",
or "audit security".
allowed-tools: Read, Write, Edit, Grep, Glob, Bash(docker:*), Bash(kubectl:*)
version: 1.0.0
author: Jeremy Longshore <[email protected]>
license: MIT
---
# Container Security Scanner
This skill provides automated assistance for container security scanner tasks.
## Prerequisites
Before using this skill, ensure:
- Required credentials and permissions for the operations
- Understanding of the system architecture and dependencies
- Backup of critical data before making structural changes
- Access to relevant documentation and configuration files
- Monitoring tools configured for observability
- Development or staging environment available for testing
## Instructions
### Step 1: Assess Current State
1. Review current configuration, setup, and baseline metrics
2. Identify specific requirements, goals, and constraints
3. Document existing patterns, issues, and pain points
4. Analyze dependencies and integration points
5. Validate all prerequisites are met before proceeding
### Step 2: Design Solution
1. Define optimal approach based on best practices
2. Create detailed implementation plan with clear steps
3. Identify potential risks and mitigation strategies
4. Document expected outcomes and success criteria
5. Review plan with team or stakeholders if needed
### Step 3: Implement Changes
1. Execute implementation in non-production environment first
2. Verify changes work as expected with thorough testing
3. Monitor for any issues, errors, or performance impacts
4. Document all changes, decisions, and configurations
5. Prepare rollback plan and recovery procedures
### Step 4: Validate Implementation
1. Run comprehensive tests to verify all functionality
2. Compare performance metrics against baseline
3. Confirm no unintended side effects or regressions
4. Update all relevant documentation
5. Obtain approval before production deployment
### Step 5: Deploy to Production
1. Schedule deployment during appropriate maintenance window
2. Execute implementation with real-time monitoring
3. Watch closely for any issues or anomalies
4. Verify successful deployment and functionality
5. Document completion, metrics, and lessons learned
## Output
This skill produces:
**Implementation Artifacts**: Scripts, configuration files, code, and automation tools
**Documentation**: Comprehensive documentation of changes, procedures, and architecture
**Test Results**: Validation reports, test coverage, and quality metrics
**Monitoring Configuration**: Dashboards, alerts, metrics, and observability setup
**Runbooks**: Operational procedures for maintenance, troubleshooting, and incident response
## Error Handling
**Permission and Access Issues**:
- Verify credentials and permissions for all operations
- Request elevated access if required for specific tasks
- Document all permission requirements for automation
- Use separate service accounts for privileged operations
- Implement least-privilege access principles
**Connection and Network Failures**:
- Check network connectivity, firewalls, and security groups
- Verify service endpoints, DNS resolution, and routing
- Test connections using diagnostic and troubleshooting tools
- Review network policies, ACLs, and security configurations
- Implement retry logic with exponential backoff
**Resource Constraints**:
- Monitor resource usage (CPU, memory, disk, network)
- Implement throttling, rate limiting, or queue mechanisms
- Schedule resource-intensive tasks during low-traffic periods
- Scale infrastructure resources if consistently hitting limits
- Optimize queries, code, or configurations for efficiency
**Configuration and Syntax Errors**:
- Validate all configuration syntax before applying changes
- Test configurations thoroughly in non-production first
- Implement automated configuration validation checks
- Maintain version control for all configuration files
- Keep previous working configuration for quick rollback
## Resources
**Configuration Templates**: `{baseDir}/templates/container-security-scanner/`
**Documentation and Guides**: `{baseDir}/docs/container-security-scanner/`
**Example Scripts and Code**: `{baseDir}/examples/container-security-scanner/`
**Troubleshooting Guide**: `{baseDir}/docs/container-security-scanner-troubleshooting.md`
**Best Practices**: `{baseDir}/docs/container-security-scanner-best-practices.md`
**Monitoring Setup**: `{baseDir}/monitoring/container-security-scanner-dashboard.json`
## Overview
This skill provides automated assistance for the described functionality.
## Examples
Example usage patterns will be demonstrated in context.This skill automates container security scanning, vulnerability detection, and compliance guidance for containerized workloads. It produces artifacts, documentation, and monitoring configurations to operationalize findings and harden runtime environments. Use it to assess, design, implement, validate, and deploy container security controls across development and production lifecycles.
The skill inspects container images, runtime configurations, orchestration manifests, and supporting infrastructure for common misconfigurations and known CVEs. It generates remediation steps, configuration templates, automation scripts, and monitoring dashboards, and provides an execution plan that moves from non-production testing to production deployment. Error handling and validation checks are built into each phase to ensure safe rollouts and repeatable results.
What prerequisites are required to run scans?
Ensure you have required credentials, appropriate permissions, access to documentation, and a non-production environment for testing.
How are false positives handled?
Validate findings in staging, tune scanner rules, and document accepted risks or exceptions in runbooks before deploying changes to production.