Container vulnerability scanning

Identify more vulnerabilities and accelerate remediation.

Protect cloud-native workloads with continuous vulnerability scanning for container images.

What is container vulnerability scanning?

The purpose of a software container vulnerability scan is to harden container images by identifying malware, secrets, security risks, and vulnerabilities in the software components. This can happen in CI/CD pipelines, registries, and Kubernetes platforms.
Sample output of vulnerability data in JSON format and reporting metrics in the UI

Automate container scanning.

Leverage comprehensive APIs and a CLI tool to automate image scanning for development environments, CI/CD pipelines, registries, or runtime environments.
Illustration of Anchore Policy Engine reducing false positives by using multiple data sources for vulnerability data.

Fewer false positives.

Accelerate software delivery with curated vulnerability feeds, optimized vulnerability matching, and a unique feedback loop that reduces false positives and false negatives.
Anchore Engine action reports configuration example

Quicker, easier remediation.

View, manage, and fix vulnerabilities and security issues in container images quickly with automated remediation recommendations and workflows.

How Container Vulnerability Scanning works.

Inspect and secure workloads across the entire software supply chain

Easily integrate across your toolchain.

Explore our solutions

Federal Compliance

Automate compliance checks using out-of-the-box and custom policies.

Open Source Security

Improve open source security by easily tracking direct and transitive open source dependencies to identify and fix vulnerabilities early.


Automate DevSecOps for your cloud-native software supply chain with an API-first DevSecOps solution.

Container Security

Identify and remediate container security risks and monitor post-deployment for new vulnerabilities.

FedRAMP Vulnerability Scanning

Meet the new FedRAMP Vulnerability Scanning Requirements for Containers and achieve compliance faster with Anchore.

Container Vulnerability Scanning

Reduce false positives and false negatives with best-in-class signal-to-noise ratio.

Kubernetes Images Scanning

Allow or prevent deployment of images based on flexible policies and continuously monitor the inventory of insecure images running in your clusters.

Container Registry Scanning

Identify and remediate new risks and vulnerabilities as they emerge.

CI/CD Security & Compliance

Embed security and compliance into your CI/CD pipeline to uncover vulnerabilities, secrets, and malware in your automated build processes.

Software Bill of Materials

Get comprehensive visibility of your software components and ensure vulnerability accuracy with the most complete SBOM available. Generate, store, analyze, and monitor SBOMs across the application lifecycle to identify software dependencies and improve supply chain security.

Container Compliance

Automate compliance checks using out-of-the-box and custom policies.

Speak with our security experts

Learn how Anchore’s SBOM-powered platform can help secure your software supply chain.