Container test
Usage
snyk container test [<OPTIONS>] [<IMAGE>]
Description
The snyk container test
command tests container images for any known vulnerabilities.
Exit codes
Possible exit codes and their meaning:
0: success (scan completed), no vulnerabilities found
1: action_needed (scan completed), vulnerabilities found
2: failure, try to re-run command. Use -d
to output the debug logs.
3: failure, no supported projects detected
Configure the Snyk CLI
You can use environment variables to configure the Snyk CLI and set variables for connecting with the Snyk API.
There are environment variables that apply to the container command; see Configure the Snyk CLI
Debug
Use the -d
option to output the debug logs.
Options
--print-deps
--print-deps
Print the dependency tree before sending it for analysis.
--org=<ORG_ID>
--org=<ORG_ID>
Specify the <ORG_ID>
to run Snyk commands tied to a specific Snyk Organization. The <ORG_ID>
influences some features availability and private test limits.
If you have multiple Organizations, you can set a default from the CLI using:
$ snyk config set org=<ORG_ID>
Set a default to ensure all newly tested and monitored projects are tested and monitored under your default Organization. If you need to override the default, use the --org=<ORG_ID>
option.
Default: <ORG_ID>
that is the current preferred Organization in your Account settings
Note: You can also use --org=<orgslugname>.
The ORG_ID
works in both the CLI and the API. The Organization slug name works in the CLI, but not in the API.
orgslugname
must match the slug name as displayed in the URL of your org in the Snyk UI: https://app.snyk.io/org/[orgslugname]
. The orgname does not work.
For more information see the article How to select the Organization to use in the CLI
--file=<FILE_PATH>
--file=<FILE_PATH>
For more detailed advice, include the path to the Dockerfile for the image.
--project-name=<PROJECT_NAME>
--project-name=<PROJECT_NAME>
Specify a custom Snyk project name.
--policy-path=<PATH_TO_POLICY_FILE>
--policy-path=<PATH_TO_POLICY_FILE>
Manually pass a path to a .snyk
policy file.
--json
--json
Print results on the console as a JSON data structure.
Example: $ snyk container test --json
--json-file-output=<OUTPUT_FILE_PATH>
--json-file-output=<OUTPUT_FILE_PATH>
Save test output in JSON format as a JSON data structure directly to the specified file, regardless of whether or not you use the --json
option.
Use to display the human-readable test output using stdout and at the same time save the JSON data structure output to a file.
Example: $ snyk container test --json-file-output=vuln.json
--sarif
--sarif
Return results in SARIF format.
--sarif-file-output=<OUTPUT_FILE_PATH>
--sarif-file-output=<OUTPUT_FILE_PATH>
Save test output in SARIF format directly to the <OUTPUT_FILE_PATH>
file, regardless of whether or not you use the --sarif
option.
This is especially useful if you want to display the human-readable test output using stdout and at the same time save the SARIF format output to a file.
--severity-threshold=<low|medium|high|critical>
--severity-threshold=<low|medium|high|critical>
Report only vulnerabilities at the specified level or higher.
--fail-on=<all|upgradable>
--fail-on=<all|upgradable>
Fail only when there are vulnerabilities that can be fixed.
all
: fail when there is at least one vulnerability that can be either upgraded or patched.upgradable
: fail when there is at least one vulnerability for which Snyk has a computed remediation available.
To fail on any Snyk discoverable vulnerability (the default behavior), do not use the --fail-on
option. If vulnerabilities do not have a Snyk-computed fix and this option is being used, tests pass.
Note: If you test code constrained by metadata that Snyk cannot respect with snyk test
, Snyk will not propose a fix, in order to avoid breaking your code. You may be able to identify and apply a fix manually.
--app-vulns
--app-vulns
Allow detection of vulnerabilities in your application dependencies from container images, as well as from the operating system, all in one single scan.
In CLI versions 1.1090.0 (2023-01-24) and higher, Snyk scans for application dependencies in your image by default; you do not need to specify the --app-vulns
flag.
In CLI versions 1.962.0 through v1.1089.0, use the --app-vulns
option with the the --json
option to see the operating system as well as application vulnerabilities in JSON format in the results.
--exclude-app-vulns
--exclude-app-vulns
Allow disabling scans for app vulnerabilities; in CLI versions 1.1090.0 (2023-01-24) and higher, app-vulns
is enabled by default.
In earlier releases, cannot be used with --app-vulns
.
--nested-jars-depth
--nested-jars-depth
When app-vulns
is enabled, use the --nested-jars-depth=n
option to set how many levels of nested jars Snyk is to unpack. Depth must be a number.
--exclude-base-image-vulns
--exclude-base-image-vulns
Do not show vulnerabilities introduced only by the base image. Available when using snyk container test
only. Works for operating system packages only.
--platform=<PLATFORM>
--platform=<PLATFORM>
For multi-architecture images, specify the platform to test.
Supported platforms are: linux/amd64
, linux/arm64
, linux/riscv64
, linux/ppc64le
, linux/s390x
, linux/386
, linux/arm/v7
, or linux/arm/v6
--username=<CONTAINER_REGISTRY_USERNAME>
--username=<CONTAINER_REGISTRY_USERNAME>
Specify a username to use when connecting to a container registry. This is ignored in favor of local Docker binary credentials when Docker is present.
--password=<CONTAINER_REGISTRY_PASSWORD>
--password=<CONTAINER_REGISTRY_PASSWORD>
Specify a password to use when connecting to a container registry. This is ignored in favor of local Docker binary credentials when Docker is present.
Examples for the container test command
Scan Docker images
$ snyk container test <image>
Option to get more information including base image remediation
--file=path/to/Dockerfile
Scan a Docker image created using the given Dockerfile and with a specified policy path
$ snyk container test app:latest --file=Dockerfile
$ snyk container test app:latest --file=Dockerfile --policy-path=path/to/.snyk
Refer to a container image by its digest
$ snyk container test app@sha256:17cb37098f0efb819c075eea4ff2a495be909a396e86ece317a6e3a8968e025c --file=Dockerfile
For more information and examples, see Advanced Snyk Container CLI usage
See also Detect application vulnerabilities in container images
Last updated