Skip to main content

lacework vulnerability container scan

Request an on-demand container vulnerability assessment


Request on-demand container vulnerability assessments and view the generated results.

To list all container registries configured in your account:

lacework vulnerability container list-registries

NOTE: Scans can take up to 15 minutes to return results.


<registry>    container registry where the container image has been published
<repository> repository name that contains the container image
<tag|digest> either a tag or an image digest to scan (digest format: sha256:1ee...1d3b)
lacework vulnerability container scan <registry> <repository> <tag|digest> [flags]


      --details                   increase details of a vulnerability assessment
--fail_on_fixable fail if the assessed container has fixable vulnerabilities
--fail_on_severity string specify a severity threshold to fail if vulnerabilities are found (critical, high, medium, low, info)
--fixable only show fixable vulnerabilities
-h, --help help for scan
--html generate a vulnerability assessment in HTML format
--packages show a list of packages with CVE count
--poll poll until the vulnerability scan completes
--severity string filter vulnerability assessment by severity threshold (critical, high, medium, low, info)

Options inherited from parent commands

  -a, --account string      account subdomain of URL (i.e. <ACCOUNT>
-k, --api_key string access key id
-s, --api_secret string secret access key
--api_token string access token (replaces the use of api_key and api_secret)
--debug turn on debug logging
--json switch commands output from human-readable to json format
--nocache turn off caching
--nocolor turn off colors
--noninteractive turn off interactive mode (disable spinners, prompts, etc.)
--organization access organization level data sets (org admins only)
-p, --profile string switch between profiles configured at ~/.lacework.toml
--subaccount string sub-account name inside your organization (org admins only)