lxd-probe VS amicontained

Compare lxd-probe vs amicontained and see what are their differences.

lxd-probe

Open Source runtime scanner for Linux containers (LXD / LXC), It performs security audit checks based on CIS Linux containers Benchmark specification (by chen-keinan)

amicontained

Container introspection tool. Find out what container runtime is being used as well as features available. (by genuinetools)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
lxd-probe amicontained
1 4
22 947
- 1.5%
3.4 0.0
4 days ago over 3 years ago
Go Go
Apache License 2.0 MIT License
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

lxd-probe

Posts with mentions or reviews of lxd-probe. We have used some of these posts to build our list of alternatives and similar projects.

amicontained

Posts with mentions or reviews of amicontained. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-06-06.
  • Is there a trick to know we're in a container?
    1 project | /r/docker | 15 Jul 2022
    If you want a tool based solution to this, tools like amicontained can tell you that in a container and some information about the sandbox.
  • Ask r/kubernetes: What are you working on this week?
    4 projects | /r/kubernetes | 6 Jun 2022
    I'm looking into SECCOMP profiles as well, but so far is seems a lot of pain for little gain. This series by Paulo Gomes is my starting point. part2 part3 testing-container.
  • Container capabilities
    1 project | /r/docker | 26 Jan 2022
    If you want to check the exact syscalls and caps in a container, getting a shell and using something like amicontained https://github.com/genuinetools/amicontained is a good option.
  • Hardening Docker and Kubernetes with seccomp
    2 projects | dev.to | 15 Jan 2021
    We made a few changes here. Namely, we changed seccompProfile section where we specify RuntimeDefault type and we also changed the image to amicontained which is a container introspection tool that will tell us which syscalls are blocked, as well as some other interesting security info.

What are some alternatives?

When comparing lxd-probe and amicontained you can also consider the following projects:

distrobuilder - System container image builder for LXC and Incus

runtime - Kata Containers version 1.x runtime (for version 2.x see https://github.com/kata-containers/kata-containers).

o365beat - Elastic Beat for fetching and shipping Office 365 audit events

Lean and Mean Docker containers - Slim(toolkit): Don't change anything in your container image and minify it by up to 30x (and for compiled languages even more) making it secure too! (free and open source)

xpid - Linux Process Discovery. C Library, Go bindings, Runtime.

kubernetes-ingress - NGINX and NGINX Plus Ingress Controllers for Kubernetes

packer-plugin-lxd - Packer plugin for LXD Builder

labs - This is a collection of tutorials for learning how to use Docker with various tools. Contributions welcome.

cloudquery - The open source high performance ELT framework powered by Apache Arrow

UBUNTU20-CIS - Ansible role for Ubuntu 2004 CIS Baseline

trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

img - Standalone, daemon-less, unprivileged Dockerfile and OCI compatible container image builder.