Automated privilege escalation of the world's most popular Docker images.
This repository contains the results of a Trickest workflow that performs a collection of multiple types of security checks and vulnerability tests on DockerHub's top 100 most downloaded images. The tests include (but are not limited to):
cat
ing the /etc/passwd
and /etc/shadow
in search for blank passwords
guid
and suid
executablesA Trickest workflow collects a list of DockerHub's most used images and their tags. Then it uses a collection of custom scripts and a couple of open-source tools like trivy to get an overview of each image's security posture and overall attack surface.
All contributions/ideas/suggestions are welcome! Feel free to create a new ticket via GitHub issues, tweet at us @trick3st, or join the conversation on Discord.
We believe in the value of tinkering. Sign up for an access or visit trickest.com to customize this workflow to your use case, get access to many more workflows, or build your own from scratch!