LinuxCommandLibrary

dockdiver

Docker image secrets scanner

TLDR

Scan Docker Hub for secrets

$ dockdiver -u [username]
copy
Scan specific image
$ dockdiver -i [image:tag]
copy
Scan with output file
$ dockdiver -u [username] -o [results.txt]
copy
Scan with custom patterns
$ dockdiver -i [image:tag] -p [patterns.json]
copy

SYNOPSIS

dockdiver [options]

DESCRIPTION

dockdiver is a security tool for analyzing Docker images and Docker Hub repositories for exposed secrets, credentials, and sensitive information. It scans image layers to identify potentially dangerous data leakage.
The tool searches for common secret patterns including API keys, passwords, private keys, and credentials embedded in Docker images. It can scan individual images or entire user repositories.
dockdiver helps security teams audit container images before deployment and identify credential exposure in public registries.

PARAMETERS

-u USERNAME

Docker Hub username to scan.
-i IMAGE
Specific image to analyze.
-o FILE
Output file for results.
-p FILE
Custom pattern file.
-v
Verbose output.
--help
Display help information.

CAVEATS

Scanning large images may take time. Some secrets may be obfuscated or encoded. Only scans accessible images. Pattern matching may produce false positives.

HISTORY

dockdiver was created as a security research tool to address the widespread problem of secrets being accidentally committed to Docker images. It automates the discovery of exposed credentials in container registries.

SEE ALSO

dive(1), trivy(1), grype(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community