保護DataHogo
LearnFree ToolsBlogPricingWhy I Built ThisSign inGet Started
Back to all vulnerabilities

Docker & Containers

Running as root, latest tags, secrets in Dockerfiles, unnecessary exposed ports, and missing health checks in containerized apps.

5 vulnerabilities

Running as Root in Docker

medium

Containers that run as root give any code execution vulnerability immediate root access to the container — and potentially the host.

CWE-250A05:2021

Docker Latest Tag

low

Using FROM image:latest means a new pull can silently change your base image, breaking reproducibility and potentially introducing vulnerabilities.

CWE-1104A06:2021

Secrets in Dockerfile

critical

Secrets added via ENV, ARG, or COPY .env in a Dockerfile are baked into the image layers and readable by anyone who pulls the image.

CWE-540A02:2021

Unnecessary Exposed Ports

low

EXPOSE-ing ports your application doesn't actually use increases the attack surface without any benefit.

CWE-16A05:2021

No Docker Health Check

low

Without a HEALTHCHECK instruction, Docker and orchestrators can't detect when your container is running but broken — routing traffic to a dead app.

CWE-778
保護DataHogo

Product

  • Security Scanner
  • Security for Vibecoders
  • Snyk Alternative
  • Pricing

Resources

  • Learn
  • Free Tools
  • Blog

Company

  • Why I Built This
  • Terms
  • Privacy

© 2026 Data Hogo. All rights reserved.