h4cker/docker-and-k8s-security/docker/docker-bench-websploit.sh
2021-04-11 18:29:43 -04:00

32 lines
987 B
Bash

#!/bin/bash
# A lame and quick script to run docker-bench-security in WebSploit Labs
# Omar Santos @santosomar
red=$(tput setaf 1)
green=$(tput setaf 2)
reset=$(tput sgr0)
echo "Running docker-bench-security ${red}WebSploit Labs easy script"
printf -- '\n';
docker run --rm --net host --pid host --userns host --cap-add audit_control \
-e DOCKER_CONTENT_TRUST=$DOCKER_CONTENT_TRUST \
-v /etc:/etc:ro \
-v /lib/systemd/system:/lib/systemd/system:ro \
-v /usr/bin/containerd:/usr/bin/containerd:ro \
-v /usr/bin/runc:/usr/bin/runc:ro \
-v /usr/lib/systemd:/usr/lib/systemd:ro \
-v /var/lib:/var/lib:ro \
-v /var/run/docker.sock:/var/run/docker.sock:ro \
--label docker_bench_security \
docker/docker-bench-security > bench_results.txt
cat bench_results.txt | grep WARN
printf -- '\n';
echo "${red}The output above only includes the major findings."
echo "${reset}The complete results have been stored at:
${green}$(pwd)/bench_results.txt "