veinmind-history is an image anomaly history command scanning tool developed by Chaitin Technology
- Quickly scan the image for abnormal history commands
- Support custom historical command detection rules
- Support two container runtime
containerd
anddockerd
- linux/amd64
- linux/386
- linux/arm64
- linux/arm
-
install
libveinmind
firstlly ,you can click here offical document for more info -
install python dependencies which
veinmind-history
need,execute the command in the project directorycp -r ./veinmind-common ./plugins/python/veinmind-history && rm -rf ./plugins/python/veinmind-history/veinmind-common/go cd ./plugins/python/veinmind-history pip install -r requirements.txt
-
Install by Parallel Container,pull
veinmind-history
iamge and startdocker run --rm -it --mount 'type=bind,source=/,target=/host,readonly,bind-propagation=rslave' veinmind/veinmind-history
-
or start with the script which we provided
chmod +x parallel-container-run.sh && ./parallel-container-run.sh
-
Scan image with specified image name or ID(need to have a corresponding image locally)
python scan.py scan-images [imagename/imageid]
-
Scan all local images
python scan.py scan-images
-
Specify the container runtime type
python scan.py scan-images --containerd
container runtime type
- dockerd
- containerd
-
Specify output type
python scan.py --output [outputtype] scan-images
- description: description for rules
- instruct: click here for more info
- match: content matching rules, the default is regular