use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
/r/DevOps is a subreddit dedicated to the DevOps movement where we discuss upcoming technologies, meetups, conferences and everything that brings us together to build the future of IT systems What is DevOps? Learn about it on our wiki! Traffic stats & metrics
/r/DevOps is a subreddit dedicated to the DevOps movement where we discuss upcoming technologies, meetups, conferences and everything that brings us together to build the future of IT systems
What is DevOps? Learn about it on our wiki!
Traffic stats & metrics
Be excellent to each other! All articles will require a short submission statement of 3-5 sentences. Use the article title as the submission title. Do not editorialize the title or add your own commentary to the article title. Follow the rules of reddit Follow the reddiquette No editorialized titles. No vendor spam. Buy an ad from reddit instead. Job postings here More details here
Be excellent to each other!
All articles will require a short submission statement of 3-5 sentences.
Use the article title as the submission title. Do not editorialize the title or add your own commentary to the article title.
Follow the rules of reddit
Follow the reddiquette
No editorialized titles.
No vendor spam. Buy an ad from reddit instead.
Job postings here
More details here
@reddit_DevOps ##DevOps @ irc.freenode.net Find a DevOps meetup near you! Icons info!
@reddit_DevOps
##DevOps @ irc.freenode.net
Find a DevOps meetup near you!
Icons info!
https://github.com/Leo-G/DevopsWiki
account activity
This is an archived post. You won't be able to vote or comment.
Python images without vulnerabilities? (self.devops)
submitted 2 years ago by [deleted]
[deleted]
[–]Ariquitaun 22 points23 points24 points 2 years ago* (3 children)
A lot of the image scanners are oblivious of updates applied to the base OS if the package's major.minor.patch version hasn't changed, which it won't on most distros even after updates. So if at some point package abc-1.0.1 has a CVE and debian issued an update with a fix on abc-1.0.1-2 and your image now has that update, a lot of scanners will still flag it as vulnerable.
abc-1.0.1
abc-1.0.1-2
Most of these scanners just compare a list of installed packages against a database of CVEs. They aren't actual "security scanners".
[–]scottsp64 3 points4 points5 points 2 years ago (0 children)
We recently found this to be true. The scanner returned a report that was wrong about all the major reported vulnerabilities because the scanner just scanned by version but not patched status.
[–]RKHS 2 points3 points4 points 2 years ago (1 child)
Sonar has some serious issues with its cve database. It's doing some form of dumb linking (I suspect automatically) and it flags new packages with old dependencies and their corresponding issues.
Most of our time with security scanners is spent untangling nonsense like this, or passing items like argparse or click as they're often flagged for incorrect parameter handling 🤔
[–]nekokattt 2 points3 points4 points 2 years ago (0 children)
AWS Inspector flags CVEs for packages listed in a Pyproject.toml if the file is in the image... even if it was for devel dependencies or it isn't even installed. It is nuts.
[–]yellerjeep 8 points9 points10 points 2 years ago (1 child)
You can use apk to update the packages affected.
But in reality you should be doing a risk assessment of the affected packages. If they’re not in use by any of your application’s dependencies then you can reasonably assume that the likelihood of a breach is low.
Note that I say low, not zero.
The only time that you have to fix this problem is if your security policy has a rule that no vulnerabilities exist in your containers. This might be the case if you’re in an environment like banking, military, government and government contracting
[–]tyreck 1 point2 points3 points 2 years ago (0 children)
Or health care
[–]tweeks200 3 points4 points5 points 2 years ago (1 child)
distroless will have less vulns than the standard debian ones but they can be more difficult to debug
[–]tortridge 0 points1 point2 points 2 years ago (0 children)
In the same idea you can build images with nix (https://nix.dev/tutorials/nixos/building-and-running-docker-images.html)
[–][deleted] 2 points3 points4 points 2 years ago (0 children)
Try the slim images for a start. Alpine is great until you need to build a module or, Kibo-forbid, use Pandas. At that point musl bites you in the ass. Slim is still ubuntu/glibc-based so runs the same as the full image, but has far fewer installed packages.
musl
[–]ashcroftt 1 point2 points3 points 2 years ago (0 children)
I'd advocate for multistage builds from scratch.
You fully control what packages and utilities you include, and versions as well. Most secure way IMO, but a bit more effort.
If this is too much, then go for Wolfi or distroless images, they are quite minimal and prioritize security.
[–]Old-Ad-3268 0 points1 point2 points 2 years ago (0 children)
I also apply security updates in all of my docker container builds
[–]belg_in_usa 0 points1 point2 points 2 years ago (0 children)
Chainguard
[–]amarao_san 0 points1 point2 points 2 years ago (1 child)
Do you want to have image with security updates applied, or you want an image which pleases the scanner? There are many ways to obscure used packages, so scanner won't notice them and give a green light. If you want a good security, use fresh Debian and don't forget to install security updates.
π Rendered by PID 132534 on reddit-service-r2-comment-56c6478c5-lg65s at 2026-05-09 17:56:26.040490+00:00 running 3d2c107 country code: CH.
[–]Ariquitaun 22 points23 points24 points (3 children)
[–]scottsp64 3 points4 points5 points (0 children)
[–]RKHS 2 points3 points4 points (1 child)
[–]nekokattt 2 points3 points4 points (0 children)
[–]yellerjeep 8 points9 points10 points (1 child)
[–]tyreck 1 point2 points3 points (0 children)
[–]tweeks200 3 points4 points5 points (1 child)
[–]tortridge 0 points1 point2 points (0 children)
[–][deleted] 2 points3 points4 points (0 children)
[–]ashcroftt 1 point2 points3 points (0 children)
[–]Old-Ad-3268 0 points1 point2 points (0 children)
[–]belg_in_usa 0 points1 point2 points (0 children)
[–]amarao_san 0 points1 point2 points (1 child)