Docker Image Security

This cluster focuses on security vulnerabilities like CVEs in Docker container images, including issues with base OS packages, update challenges, scanning tools, and best practices for using official or hardened images.

➡️ Stable 0.6x Security
1,658
Comments
14
Years Active
5
Top Authors
#9434
Topic ID

Activity Over Time

2013
11
2014
61
2015
120
2016
92
2017
93
2018
142
2019
185
2020
145
2021
203
2022
144
2023
159
2024
108
2025
185
2026
10

Keywords

PHP FROM OK TUF ID ycombinator.com i.e docker.org anchore.io CICD docker images image container containers security vulnerabilities dependencies docker image docker container

Sample Comments

x5n1 Jun 12, 2015 View on HN

They are not really problems. Your vendor should roll you new images when the software running in your container poses a security risk.You always have to trust your vendor. And if you don't you can always roll your own docker images using the Dockerfile in their github repo.

ChrisArchitect Jan 8, 2026 View on HN

Related:A Safer Container Ecosystem with Docker: Free Docker Hardened Imageshttps://news.ycombinator.com/item?id=46302337

goodpoint Jan 22, 2022 View on HN

Containers are not good for security updates.docker also adds a big attack surface.

prescriptivist Oct 16, 2025 View on HN

It's a sneaky supply chain threat for docker images. I'm not sure standard container registry tools actively scan for this. Of course you shouldn't be running random untrusted docker images that you find on the internet but it happens all the time in dev envs and in sloppy production environments.

oxfordmale Mar 6, 2022 View on HN

Ideally you only use Docker official images,or their equivalent to avoid using unvetted code.It is always a trade off, however it is far more likely that a hacker will use a ten year old well exploited CVE, rather than a recent one

firesteelrain Aug 29, 2025 View on HN

Docker doesn’t have hardened / zero CVE containers

raesene4 Feb 12, 2016 View on HN

any particular reasons you don't trust Docker security?

kenm47 Aug 3, 2021 View on HN

there are good free/oss container scanners. check out Trivy.—no reason not to use one.

samvher Dec 17, 2020 View on HN

Looks like the page is down unfortunately.I've seen headlines like this before, but at the time a lot of the vulnerabilities were in packages that were installed on the image but were not launched, or generally not exposed. I do wish for an easy way to frequently update images though (i.e. rebuilding them from scratch installing the latest packages). It's often hard to determine what you're including in your container.

KaplanA May 8, 2025 View on HN

Finally someone is shutting the CVEs noise with container images