Introduction
Every time we build a Docker image, we bundle together dozens of software components: base operating system, system libraries, language runtime, and our own application code. Each piece can have hidden security holes that attackers alrea...