Clair is an open source project for the static analysis of vulnerabilities in application containers (currently including OCI and docker). Clients use the Clair API to index their container images and can then match it against known vulnerabilities. Our goal is to enable a more transparent view of the security of container-based infrastructure. Thus, the project was named Clair after the French term which translates to clear, bright, transparent. The book contains all the documentation on Clair's architecture and operation. Community Mailing List: clair-dev@googlegroups.com IRC: #clair on freenode.org Bugs: issues Contributing See CONTRIBUTING for details on submitting patches and the contribution workflow. License Clair is under the Apache 2.0 license. See the LICENSE file for details.

FEATURES

This tool is not verified yet and doesn't have listed features.

Did you submit the verified tool? Sign in to add features.

Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.

ALTERNATIVES

AWVS Logo
0.0

A hosted web application security testing tool that enables security researchers to register, activate their accounts, and scan web applications for vulnerabilities.

Vuls Logo
0.0

Vulnerability scanner for Linux/FreeBSD, written in Go, agent-less, informs users of vulnerabilities related to the system and affected servers.

Web server scanner for identifying security vulnerabilities.

A presentation about the OWASP Top 10, a list of the most critical security risks to web applications.

A tool that automatically audits website security by crawling an entire website and identifying vulnerabilities

Cloud-based service for testing and analyzing Android and iOS apps for malware, vulnerabilities, and security threats.