compose-lint
Version updated for https://github.com/tmatens/compose-lint to version v0.5.1.
- This action is used across all versions by 0 repositories.
Action Type
This is a Composite action.
Go to the GitHub Marketplace to find the latest changes.
Action Summary
The compose-lint GitHub Action is a security-focused linter for Docker Compose files that identifies and prevents potentially dangerous misconfigurations before deployment. It automates the process of validating Compose files against best practices and security standards, such as OWASP and CIS benchmarks, providing a fast, opinionated, and zero-configuration way to ensure secure container configurations. Its key features include support for auto-detection of Compose files, thorough security checks, and integration with tools like Docker Scout, Trivy, and Grype for vulnerability scanning.
What’s Changed
Changed
- Container image strips the
pippackage code andpipCLI binaries from the runtime venv but keeps pip’s.dist-infometadata. 0.4.1 stripped all of it to silence Docker Scout alerts on unreachable pip CVEs, but deleting the.dist-infoalso removed the signal SCA scanners use to identify pip — making the image appear vuln-free by metadata deletion rather than by code removal. Keeping the metadata while dropping the code gives honest reporting: scanners still see pip and flag CVE-2025-8869 / CVE-2026-1703, and the code that would host those CVEs is gone from the runtime layer. The CVEs also remain unreachable by execution path — distroless base, no shell, entrypoint is/venv/bin/compose-lint. Theactivate*shell-script stripping from 0.4.1 stays.
Added
- OpenVEX document (
.vex/compose-lint.openvex.json) published as a release asset alongside the SBOM, Sigstore bundles, and SLSA provenance, and attached to the container image manifest as a cosign in-toto attestation (predicate typeopenvex). Declares the known pip CVEs (CVE-2025-8869, CVE-2026-1703) asnot_affectedagainst the container image with justificationvulnerable_code_not_present. Scanners invoked with--vexon the release asset, or attestation-aware scanners (Docker Scout; Trivy / Grype in attestation-discovery modes), render those CVEs as non-exploitable rather than either hiding pip or flagging reachable risk. New pip CVEs get added to the VEX when verified as covered by the same mitigation; CVEs in any actually-reachable code path do not.