Skip to content

microsoft/sbi

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

11 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

SBI β€” Secure Base Image Recommendations

OpenSSF Scorecard

Every night, this project scans configured MCR (Microsoft Container Registry) container base images for vulnerabilities and generates a recommended secure base images report, ranked by language. The default configuration targets MCR images, but the tool supports scanning any container registry.

πŸ“Š Daily Reports

Format Link
Markdown docs/daily_recommendations.md
JSON docs/daily_recommendations.json

Reports are regenerated nightly at 02:00 UTC via GitHub Actions. Images are ranked per language by: fewest critical β†’ fewest high β†’ fewest total vulnerabilities β†’ smallest size.

Note: The nightly workflow currently pushes results to the nightly-scan-results branch and requires a manual PR to merge into main, because GitHub Actions on this repository cannot create pull requests automatically. See #6 for details and the planned migration to a GitHub App token.

How It Works

A nightly GitHub Actions workflow runs the full pipeline:

  1. Discover β€” Enumerate image tags from MCR (Microsoft Container Registry)
  2. Pull & Analyze β€” Pull images, generate SBOM with Syft, detect language runtimes
  3. Scan β€” Run Trivy vulnerability scanning
  4. Verify β€” Runtime verification of detected languages inside containers
  5. Store β€” Persist results in a SQLite database (tracked via Git LFS)
  6. Report β€” Generate ranked markdown and JSON reports, commit and push to this repo

What Gets Scanned

Image sources and tag filtering rules are configured in config/repositories.json. Currently scans Azure Linux base/distroless images, .NET, Go, and OpenJDK images from MCR.

Note: The daily reports will be updated on the next scheduled nightly run after merge.

Running Locally

Prerequisites

Quick Start

# Install
go install github.com/microsoft/sbi@latest

# Scan all configured repositories and generate reports
sbi scan --verbose

# Regenerate reports from existing database
sbi report

# Clear the database
sbi reset-db

Build from Source

task build
./bin/$(go env GOOS)-$(go env GOARCH)/sbi scan --verbose

CLI Flags

Global flags (available on all subcommands):

Flag Default Description
--database azure_linux_images.db Path to SQLite database
--config-dir config Path to configuration directory
--output docs/daily_recommendations.md Path to output report file
--top-n 10 Number of top images per language per base OS (0 = all)
--json-top-n 20 Number of top images per language per base OS in JSON report (0 = all)
--verbose, -v false Enable verbose output
--debug, -d false Enable debug output

scan flags:

Flag Default Description
--max-tags 5 Maximum tags per repository (0 = all)
--comprehensive false Enable comprehensive scanning (secrets + misconfigs)
--update-existing false Rescan existing images
--no-cleanup false Keep Docker images after scanning

Configuration

Image sources and tag filtering rules are defined in config/repositories.json.

Adding or modifying repositories

Each entry in the repositories array is a group with a description and a list of images to scan. Images can be either repositories (all matching tags are discovered and scanned) or specific image:tag pairs.

To add a new repository group, add an entry like:

{
  "description": "My custom images",
  "images": [
    "azurelinux/base/core",
    "mcr.microsoft.com/dotnet/aspnet:8.0"
  ]
}
  • Repository (no :tag): Value must be a repository path only (no registry prefix), for example azurelinux/base/core. Tags are auto-discovered from the registry host configured in defaults.registry (default: mcr.microsoft.com), filtered by tagFilter rules, and limited by maxTags.
  • Single image (with :tag): Scanned as-is, no tag discovery. Use a full image reference including registry (e.g., mcr.microsoft.com/dotnet/aspnet:8.0).

Tag filtering

The tagFilter section controls which discovered tags are included:

Field Purpose Example
skipExact Tags to skip by exact match ["latest", "dev", "nightly"]
excludeKeywords Skip tags containing these substrings ["debug", "test", "arm"]
excludePatterns Skip tags matching these regex patterns ["(?i)[-.]?(alpha|beta)"]
requireDigit Only include tags that contain a digit true

Full config example

{
  "defaults": {
    "registry": "mcr.microsoft.com",
    "maxTags": 0
  },
  "tagFilter": {
    "skipExact": ["latest", "dev", "nightly", "edge"],
    "excludeKeywords": ["debug", "test", "arm", "amd"],
    "excludePatterns": ["(?i)[-.]?(alpha|beta|rc|preview)[\\d.]*$"],
    "requireDigit": true
  },
  "repositories": [
    {
      "description": "Azure Linux base images",
      "images": ["azurelinux/base/python", "azurelinux/base/nodejs"]
    }
  ]
}

Development

Requires Task for build automation:

task build        # Build binary
task test         # Run tests
task lint         # Run all linters (go, markdown, yaml)
task vulncheck    # Run Go vulnerability check
task all          # Build + test + lint

Project Structure

*.go                           # CLI entry point and cobra commands (root level)
pkg/
  domain/                      # Domain models (ImageRecord, Language, etc.)
  infrastructure/
    database/                  # SQLite schema and repository
    scanner/                   # Registry, Docker, Syft, Trivy integration
    report/                    # Markdown and JSON report generation
  usecase/                     # Pipeline orchestration
config/                        # Image sources and tag filter config
docs/                          # Generated daily reports

License

MIT

Trademarks

This project may contain trademarks or logos for projects, products, or services. Authorized use of Microsoft trademarks or logos is subject to and must follow Microsoft's Trademark & Brand Guidelines. Use of Microsoft trademarks or logos in modified versions of this project must not cause confusion or imply Microsoft sponsorship. Any use of third-party trademarks or logos are subject to those third-party's policies.

About

Secure Base Image recommendations

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors