Container Image Scanning Overview
Container image scanning in Aikido is designed to treat your images as first-class security assets. It connects three things that are usually siloed: registries (where images live), code (where you can actually fix issues), and runtimes (where risk materializes).
Defining container image scanning
A container image bundles your application code, OS packages, language runtimes, web servers, and supporting tools into a single immutable artifact. Aikido’s container image scanning focuses on three broad categories of risk in those artifacts.
Known vulnerabilities (CVEs) in OS packages and other components.
Outdated or end-of-life (EOL) runtimes (e.g. language runtimes and web servers).
Software composition and licensing, via a detailed software bill of materials (SBOM).
When you enable scanning for a registry like AWS ECR, Aikido inspects images for vulnerabilities, licenses, and EOL runtimes, and rescans them regularly so that new CVEs are caught even if the image hasn’t been rebuilt or pushed recently.
Aikido also tracks the status of key runtimes discovered inside images (such as Python, Node.js, PHP, Nginx) and classifies them as Outdated, Almost Out-of-Date, Up-to-Date, or Not Found, based on vendor support timelines. As runtimes approach or pass EOL, Aikido raises alerts and escalates severity as the deprecation date nears or passes. This is so container owners get an early signal that security updates will stop, even if everything still appears to work.
Finally, for images scanned by Aikido’s own scanner, you can export a raw Software Bill of Materials. The SBOM includes file system locations of discovered components and information about their origin. Together, vulnerabilities, runtime status, and SBOM data form the basis of Aikido’s container security model.
Where Aikido gets image data
Aikido treats your container registry (or build pipeline) as the source of truth for which images exist, and then standardizes the findings across different environments.
Cloud registries
For most cloud registires, you can either use the cloud provider's scanner (e.g., AWS Inspector for AWS ECS) or the Aikido scanner. When the Aikido Scanner is used, Aikido adds:
License and EOL runtime scanning.
Tag-level targeting (i.e., scan only images matching specific tags)
Continuous scanning on a daily schedule, even for images that haven’t been pushed recently, so newly disclosed CVEs are picked up over time.
Standalone registries
Aikido also connects directly to standalone registries like Docker Hub. After you provide a read-only access token, Aikido enumerates repositories you can access, optionally links them to code repositories for better deduplication, and scans them for vulnerabilities with results flowing into your Aikido feed.
Local image scanning and gating
Not all images ever leave your continuous integration system. For those, Aikido provides a local image scanner that you run in your own environment. This scanner can:
Scan images locally and report issues back into Aikido.
Act as a release gate, failing a pipeline when issues at or above a chosen severity are present before pushing to a registry.
Act as a pull request gate, comparing the security posture of an image built from a pull request against a base commit, and failing when new issues above a threshold are introduced.
This lets you treat container security as a guardrail around build and release instead of just a periodic check after deployment.
Linking images to code and cloud context
A vulnerability in an image is only useful if it can be mapped to the team and code that can fix it. Aikido’s model is explicitly built around linking containers to repositories and cloud assets.
You can link container images to their corresponding code repositories manually or via smart suggestions. Once linked:
Container issues appear directly within the relevant repository
Container AutoFix becomes available since Aikido can reliably locate the Dockerfile associated with an image (see below)
SBOMs and software supply chain visibility
A container's Software Bill of Materials helps you reason concretely about what is in the image and where it came from. Once an image has been scanned, you can export a raw SBOM from the container detail page. The export is designed to support:
Inspecting the filesystem locations where specific components (and their vulnerabilities) were found.
Tracking the origin of installed components across layers.
SBOM generation can also be automated via Aikido’s public API, which exposes endpoints for generating and downloading SBOMs for scanned images.
Monitoring runtimes and end-of-life risk
Many high-impact issues in containers arise not from a single CVE, but from running on a runtime or web server that has fallen out of vendor support. After you connect a registry, Aikido monitors key runtimes in your images, including Python and Node.js runtimes and common web servers like Apache and Nginx.
For each monitored runtime, Aikido assigns statuses like "Out of date", "Up to date", or "Almost out of date". Aikido also creates alerts in the feed when a specific package version is no longer maintained by the vendor, starting before deprecation and increasing issue severity as the date approaches and passes.
AI AutoFix for containers
Container scanning identifies where vulnerabilities live. AutoFix for Containers helps you change the image to remove the vulnerabilities, with minimal manual steps.
Base-image-centric remediation
When Aikido finds vulnerabilities in a container’s base image, AutoFix suggests Dockerfile changes that update that base image. It does this by proposing multiple update options and generating 3–5 Dockerfile variants, each tied to a specific base image. For each variant, AutoFix shows which vulnerabilities would be fixed and whether any new ones would be introduced.
Extended Lifetime Support (ELS) base images
For older projects, upgrading to a new major OS release or base image may be expensive or risky. To address this, Aikido offers Extended Lifetime Support (ELS) base images for containers. These are:
Based on operating systems that are no longer maintained
Provided as drop-in replacements that are intended to be compatible while removing known CVEs.
Available as more than 300 base images, usable either as a long-term replacement or as an interim step until a full upgrade is feasible.
Integration with repositories and registries
Container AutoFix relies on the earlier linking steps:
Linking containers to repositories enables AutoFix for those containers and ensures Dockerfiles are located correctly
AutoFix can work with both public and private base images, as long as private base images are scanned by Aikido.
When you select an option, AutoFix generates a pull request in your source control system containing the updated Dockerfile and associated changes. It can be run manually per image or configured to create PRs on a regular cadence for selected images.
Last updated
Was this helpful?