Skip to content

Image Tools

Tools for analyzing repositories, generating Dockerfiles, building images, and managing container artifacts.

analyze-repo — Repository Analysis

Analyzes repository structure and detects technologies by parsing config files. Identifies languages, frameworks, build systems, dependencies, and monorepo modules. Use this as the first step before generating Dockerfiles or manifests.

InputRequiredDescription
repositoryPathYesAbsolute path to the repository root
workspacePathNoCurrent workspace path (for project-scoped policy discovery)
modulesNoPre-analyzed modules — skip auto-detection if provided

Output: Detected modules with language, framework, build system, dependencies, ports, and entry point for each.


generate-dockerfile — Dockerfile Generation

Gathers insights from the knowledge base and returns a structured plan with requirements for Dockerfile creation. The AI uses this plan to write the actual Dockerfile. Policies are evaluated during generation — violations and warnings appear in the output.

InputRequiredDescription
repositoryPathYesAbsolute path to the repository root
workspacePathNoCurrent workspace path (for project-scoped policy discovery)
modulePathNoModule path for monorepo projects
languageNoPrimary language (e.g., "java", "python")
languageVersionNoLanguage version (e.g., "17", "3.11")
frameworkNoFramework (e.g., "spring", "django")
environmentNoTarget environment (production, development, etc.)
detectedDependenciesNoLibraries/features from analysis (e.g., ["redis", "mongodb"])
targetPlatformNoDocker platform (e.g., linux/amd64, linux/arm64). Defaults to linux/amd64
trafficLevelNoExpected traffic: high, medium, or low
criticalityTierNoCriticality: tier-1 (mission-critical) to tier-3 (low-priority)

Output: Build strategy, base image recommendations, security considerations, optimizations, best practices, and policy validation results.


fix-dockerfile — Dockerfile Analysis & Fixes

Analyzes an existing Dockerfile for security, performance, and best practice issues. Returns categorized findings with knowledge-based fix recommendations and a validation score. Policies are evaluated — organizational violations appear alongside technical issues.

InputRequiredDescription
dockerfileOne requiredDockerfile content to analyze
pathOne requiredPath to Dockerfile to analyze
workspacePathNoCurrent workspace path (for project-scoped policy discovery)
environmentNoTarget environment (production, development, etc.)
targetPlatformNoPlatform for context (e.g., linux/amd64)
policyPathNoPath to a specific policy file (defaults to all discovered policies)

Provide either dockerfile (content) or path (file location), not both.

Output: Categorized issues (security, performance, best practices), fix recommendations, validation score (A–F grade), and policy validation results.


build-image-context — Build Context Preparation

Prepares Docker build context with security analysis and returns ready-to-execute build commands. Validates the Dockerfile, analyzes BuildKit features, computes tags, and checks for security issues — all before the build runs.

InputRequiredDescription
pathNoBuild context directory path
dockerfileNoDockerfile name (relative to context)
dockerfilePathNoAbsolute path to Dockerfile
imageNameNoImage name for tagging
tagsNoTags to apply to the image
buildArgsNoBuild arguments (key=value pairs)
workspacePathNoCurrent workspace path (for project-scoped policy discovery)
platformNoTarget platform (e.g., linux/amd64)

Output: Validated paths, security analysis with risk level, build configuration, BuildKit feature analysis, Dockerfile analysis, and a build command ready to execute.


scan-image — Vulnerability Scanning

Scans Docker images for security vulnerabilities with AI-powered remediation guidance. Supports multiple scanners with configurable severity thresholds and focus areas.

InputRequiredDescription
imageIdYesDocker image ID or name to scan
workspacePathNoCurrent workspace path (for project-scoped policy discovery)
severityNoMinimum severity to report: LOW, MEDIUM, HIGH, CRITICAL
scanTypeNoScan type: vulnerability, config, or all (default: vulnerability)
scannerNoScanner engine: trivy, snyk, grype, or osv (default: osv)
enableAISuggestionsNoEnable AI-powered remediation suggestions (default: true)
aiEnhancementOptionsNoAI config: mode, focus, confidence, maxSuggestions, includeExamples

Output: Vulnerability findings with severity, affected packages, and AI-generated remediation guidance.


tag-image — Image Tagging

Tags a Docker image with a new version or registry tag. Simple utility for applying semantic versions, build numbers, or registry-qualified names.

InputRequiredDescription
imageIdYesDocker image ID to tag
tagYesNew tag to apply
workspacePathNoCurrent workspace path (for project-scoped policy discovery)

push-image — Registry Push

Pushes a Docker image to a container registry. Supports credential-based auth and Docker credential helpers. Use after tagging with the target registry.

InputRequiredDescription
imageIdYesDocker image ID or name to push
registryYesTarget registry hostname (e.g., myregistry.azurecr.io)
workspacePathNoCurrent workspace path (for project-scoped policy discovery)
platformNoTarget platform (e.g., linux/amd64)
credentialsNoRegistry credentials (username, password). Falls back to Docker credential helpers

Released under the MIT License.