Aikido
Container image

Find and Fix Vulnerabilities in Container Images

Secure your Kubernetes & Docker containers. Fix vulnerable images automatically with Aikido’s AI Agent.

  • Detect CVEs
  • AutoFix container images
  • Prioritize by sensitivity
  • Pre-Hardened images
Your data won't be shared · Read-only access · No CC required
Dashboard with autofixes tab

"With Aikido, we can fix an issue in just 30 seconds – click a button, merge the PR, and it’s done."

"Aikido's auto-remediation feature is a huge time-saver for our teams. It cuts through the noise, so our developers can focus on what really matters."

“With Aikido, security is just part of the way we work now. It’s fast, integrated, and actually helpful for developers.”

Chosen by 25,000+ orgs worldwide

Container registries covered

Docker

GCP

Azure

AWS

GitLab

Digital Ocean

Red Hat

JFrog

Scaleway

Cloudsmith

Aikido

GitHub

Harbor

Importance of Container Image Scanning

Why Container Image Scanning Matters

down arrow

Container images often run components exposed to the internet, making any vulnerabilities (e.g. in OpenSSL or Nginx) critical. It’s essential to scan images for such issues before deployment.

Vanta

Secure Dependencies in Containers

Find and fix vulnerabilities in the open-source packages used in your base images and Dockerfiles.

End-of-life Runtimes

Protect your application from outdated, vulnerable runtimes. These often-overlooked components can pose major security risks if left unaddressed.

Features

Container Scanning Features

Surface the Real Risks

Detects all relevant issues in your containers—vulnerable packages, outdated software, malware, and license risks across base images, Dockerfile commands, and even Kubernetes workloads.

Virtual Machine Scanning

Instant, Automated Triaging

Fix Containers in Seconds, Not Hours

Fix your container images in just a few clicks, saving your developers hours of work. Aikido indicates how many issues will be fixed & even if new issues would be introduced.

Upgrade to Secure-by-Default Images

For advanced security, AutoFix your container images with pre-hardened base images. Stay ahead of security debt with continuously updated fixes, no need for manual patching.

Spot Deprecated Components Early

Protect your application from outdated runtimes that could be vulnerable. (For example nginx, OpenSSL,...) Outdated runtimes are typically a forgotten issue, but could pose big security risks.

End-of-life runtimes

Detects What Others Don’t

Aikido checks the standard vulnerability databases (NVD, GHSA) but goes further. Aikido Intel uncovers undisclosed or CVE-less vulnerabilities and malware, providing broader and more proactive coverage.

Full Coverage in One Platform

Replace your scattered toolstack with one platform that does it all—and shows you what matters.

Code

Dependencies

Find vulnerable open-source packages in your dependencies, including transitive ones.

Learn more
Cloud

Cloud (CSPM)

Detects cloud infrastructure risks (misconfigurations, VMs, Container images) across major cloud providers.

Learn more
Code

Secrets

Checks your code for leaked and exposed API keys, passwords, certificates, encryption keys, etc...

Learn more
Code

Static Code Analysis (SAST)

Scans your source code for security risks before an issue can be merged.

Learn more
Code

Infrastructure as Code Scanning (IaC)

Scans Terraform, CloudFormation & Kubernetes infrastructure-as-code for misconfigurations.

Learn more
Test

Dynamic Testing (DAST)

Dynamically tests your web app’s front-end & APIs to find vulnerabilities through simulated attacks.

Learn more
Code

License Risk & SBOMs

Monitors your licenses for risks such as dual licensing, restrictive terms, bad reputation, etc... And generate SBOMs.

Learn more
Code

Outdated Software (EOL)

Checks if any frameworks & runtimes you are using are no longer maintained.

Learn more
Cloud

Container Images

Scans your container images for packages with security issues.

Learn more
Code

Malware

Prevent malicious packages from infiltrating your software supply chain. Powered by Aikido Intel.

Learn more
Test

API Scanning

Automatically map out and scan your API for vulnerabilities.

Learn more
Cloud

Virtual Machines

Scans your virtual machines for vulnerable packages, outdated runtimes and risky licenses.

Learn more
Defend

Runtime Protection

An in-app firewall for peace of mind. Automatically block critical injection attacks, introduce API rate limiting & more

Learn more
Code

IDE Integrations

Fix issues as you code– not after. Get in-line advice to fix vulnerabilities before commit.

Learn more
Code

On-Prem Scanner

Run Aikido’s scanners inside your environment.

Learn more
Code

CI/CD Security

Automate security for every build & deployment.

Learn more
Cloud

AI Autofix

One-click fixes for SAST, IaC, SCA & containers.

Learn more
Cloud

Cloud Asset Search

Search your entire cloud environment with simple queries to instantly find risks, misconfigurations, and exposures.

Learn more

Review

“If you're struggling to buy just one vulnerability scanning tool at an affordable price that checks the most boxes - this is the one I'd buy”

James Berthoty

Cyber Security Expert at latio.tech

What is container image scanning, and why should I bother with it if I'm already scanning my code?

Container image scanning means analyzing your built container images (Docker images, etc.) for security issues before you deploy them. Even if you scan your source code and dependencies, your container images may include other components - like OS packages, web servers, or OpenSSL - that could have vulnerabilities. In short, code scanning covers your application code, but container scanning covers the environment that your code runs in. It's important because a secure app can still be compromised if the base image or system libraries it runs on have known flaws.

How does Aikido's container image scanner work? Does it check the OS packages in my containers for CVEs?

Yes, Aikidos' container scanner looks at everything inside the image layers. It will inventory the OS packages, libraries, and other components in your container and check them against vulnerability databases for known CVEs. It doesn't stop at just OS packages either - it also flags outdated software, potential malware, and even license risks in the image. Essentially, if there's a vulnerable package in your image (whether it's an OS-level library or an app dependency baked into the image), Aikido will detect it.

Can Aikido automatically fix issues in my container images (for example, update a vulnerable base image)?

Aikido can assist with automating fixes for container images. The platform includes an AI AutoFix feature that can suggest and even apply upgrades to your container setup - for instance, it might recommend a patched base image or update a package version and can generate a fix PR for you. In practice, you get a "fix this'' button for many image vulnerabilities, which will adjust your Dockerfile or image configuration to remediate the issues, saving you from doing those upgrades manually.

How do I integrate Aikido's container scanning into my CI/CD pipeline or Kubernetes workflow?

Integration is straightforward - you can embed Aikido's container scan as a step in your CI/CD pipeline (there are plugins and integration tokens for services like GitHub Actions, GitLab CI, Jenkins, etc.). For example, after building your Docker image, you'd invoke Aikido to scan that image, and it will report any issues before you push to production. Aikido was built to plug into pipelines with minimal fuss (so it starts scanning your images from Day 1 without a lot of custom setup). In a Kubernetes workflow, the typical approach is to scan images during CI (before they ever reach the cluster), or you can connect Aikido to your container registry so it automatically scans new images that you tag for deployment.

Does Aikido scan images pushed to container registries (Docker Hub, ECR, ACR, Artifact Registry, etc.)?

Besides scanning your images when building them (in the CI/CD pipeline), Aikido can continuously scan images stored on popular container registries. This ensures that newly discovered vulnerabilities are surfaced even after the images are built.

What kinds of vulnerabilities or issues can Aikido's container scanning detect inside an image?

It detects a wide range of issues in container images. This includes known vulnerability CVEs in system packages and libraries, outdated software versions (e.g. an OS package or runtime that's past its end-of-life), malicious or compromised components (malware), and even open-source license problems present in the image. In other words, everything from a critical Linux kernel flaw to a library with a disallowed license could be flagged. The goal is to surface all the relevant risks hidden inside your image, not just the obvious "vulns."

Will Aikido's container scanner catch things like embedded secrets or bad configs in images, or just vulnerabilities?

Aikido's container scanner focuses on vulnerabilities, outdated software, and malware. It doesn't detect embedded secrets or misconfigurations directly. However, Aikido includes separate scanners for secrets (e.g., AWS keys left in files) and misconfigurations (via IaC scanning), which complement the container scanning. So while the container scanner flags CVEs and system-level risks, secrets and config issues are detected by other tools within Aikido's platform.

How does Aikido's container scanning compare to using Snyk or open-source tools like Trivy?

Aikido cuts through the noise by auto-triaging issues, reducing alert fatigue. Unlike Trivy, which lists every CVE, Aikido flags what's actually exploitable or high-risk. Compared to Snyk, Aikido offers a unified platform with SAST, DAST, and more - all in one interface. It also includes one-click fixes and private threat intel for deeper coverage than either tool typically provides.

Do I need to install any agents to scan container images with Aikido's platform?

No. Aikido is 100% agentless. It scans images by pulling layers directly from your container registry or via CLI/CI integration. There's nothing to install on your infrastructure or inside containers. For stricter environments, an on-prem option exists, but it still doesn't require runtime agents.

Does Aikido help prioritize which container vulnerabilities to fix first so I'm not guessing?

Yes. Aikido uses reachability analysis and context-aware prioritization to filter out noise and false positives. It groups duplicate issues, highlights what's exploitable, and adjusts severity based on factors like environment (e.g., production). That way, you focus on what matters most.

Which container registries or cloud platforms does Aikido support for image scanning (Docker Hub, ECR, etc.)?

Aikido supports most major registries: Docker Hub, AWS ECR, GCP, Azure, GitHub Packages, GitLab, Quay, JFrog, Harbor, and more. Whether your'e in the cloud or on-prem, Aikido can securely connect and scan your container images with minimal setup.

Get secure for free

Secure your code, cloud, and runtime in one central system.
Find and fix vulnerabilities fast automatically.

No credit card required |Scan results in 32secs.