Dockerfile Linter — Optimize & Secure Your Container Builds
Lint Dockerfile instructions for best practices, security issues, and layer optimization. Flags unpinned base images, root user, ADD vs COPY, apt-get mistakes, shell-form CMD, and more — with fix guidance for each issue.
How to Use Dockerfile Linter — Optimize & Secure Your Container Builds
How to Use the Dockerfile Linter
Step 1: Paste Your Dockerfile
Copy your entire Dockerfile and paste it into the input area. The linter parses all instructions including multi-line RUN commands joined with backslash continuations.
Step 2: Review the Summary
The summary bar shows the total issue count broken down by severity — errors (critical, must fix), warnings (important best practices), and info (recommendations). The instruction count confirms how many Dockerfile statements were successfully parsed.
Step 3: Expand Issues for Details
Click any issue card to expand it and see a full explanation of why the practice is problematic, plus a concrete fix suggestion you can copy directly into your Dockerfile.
Step 4: Try the Example Dockerfiles
Use the example buttons to see the linter in action on a naive Dockerfile (many issues), a typical Node.js app Dockerfile (some issues), and a production-ready multi-stage Dockerfile (minimal issues). These examples illustrate how each rule applies in practice.
Checks Performed
| Severity | Check | What It Catches |
|---|---|---|
| Error | Missing FROM | Dockerfile with no base image |
| Warning | Unpinned base image | FROM node (no tag) or FROM node:latest |
| Warning | Root user | No USER instruction or explicit USER root |
| Warning | ADD vs COPY | ADD used for local files instead of COPY |
| Warning | apt-get without -y | Interactive prompt would hang the build |
| Warning | apt cache not cleared | rm -rf /var/lib/apt/lists/* missing |
| Warning | apt-get update alone | Standalone update creates stale cache layer |
| Warning | Shell-form CMD/ENTRYPOINT | Poor signal handling, PID 1 is shell |
| Warning | Secrets in ENV | PASSWORD, SECRET, TOKEN, API_KEY in ENV |
| Warning | Source before manifests | Layer cache busted on every code change |
| Info | No WORKDIR | Files land in root directory |
| Info | Many RUN layers | 5+ separate RUN commands bloat image |
| Info | No EXPOSE | Port not documented |
| Info | No HEALTHCHECK | Orchestrators cannot detect unhealthy containers |
Frequently Asked Questions
Most Viewed Tools
TOTP Code Generator — 2FA Testing Tool
Generate time-based one-time passwords from a TOTP secret key. Enter your base32 secret, choose a period and digit length, and get the current and next codes with a live countdown timer. Useful for testing and debugging 2FA integrations.
Use Tool →JSON to Zod — Schema Generator
Generate Zod validation schema code from a JSON sample object. Infers z.string(), z.number(), z.boolean(), z.array(), z.object(), and z.null() types automatically. Handles nested objects, arrays of objects with optional field detection, and outputs copy-ready TypeScript with import and z.infer type alias.
Use Tool →JSONL Formatter — Line-by-Line Validator
Format, validate, and inspect JSON Lines (JSONL) and NDJSON files. Validates each line individually, reports parse errors by line number, outputs compact JSONL or a pretty-print preview, and lets you download the cleaned file.
Use Tool →TLS Cipher Suite Checker — Strength Analyzer
Check TLS protocol version compatibility and cipher suite strength ratings against current best practices. Supports IANA and OpenSSL cipher names — rates each suite as Strong, Weak, or Deprecated and explains why.
Use Tool →Secret Scanner — API Key & Credential Detector
Scan pasted text, code, or config files for accidentally exposed API keys, tokens, passwords, and private keys. Detects 50+ secret types across AWS, GitHub, Stripe, OpenAI, and more — all client-side, nothing leaves your browser.
Use Tool →Password Entropy Calculator — Crack Time Estimator
Calculate the information-theoretic bit entropy of any password or API key. Detects character set pools automatically, shows the total number of possible combinations, and estimates crack time across five attack scenarios from rate-limited web logins to GPU cracking clusters.
Use Tool →TOML Config Validator — Syntax Error Finder
Validate TOML configuration file syntax and report errors with line numbers. Paste any TOML content — Cargo.toml, pyproject.toml, config.toml — and instantly see a green checkmark with key counts and structure stats, or a precise error message pointing to the exact line. Includes a collapsible JSON structure preview to confirm what was parsed.
Use Tool →Screen Size Converter — Diagonal Dimension Tool
Calculate screen width and height from diagonal size and aspect ratio. Convert between inches and centimeters for displays, TVs, and monitors with instant dimension calculations.
Use Tool →Related DevOps & Infrastructure Tools
User Agent Parser — Browser & Device Decoder
Parse user agent strings to extract browser, operating system, device, and engine information. Essential for web analytics, device detection, and browser compatibility testing.
Use Tool →Robots.txt Generator — Crawler Control Tool
Generate robots.txt file to control search engine crawlers. Create user-agent rules, allow/disallow paths, set crawl delays, and add sitemap URLs. Perfect for managing bot access to your website.
Use Tool →robots.txt Validator — Crawl Rule Checker
Validate your robots.txt file against the Robots Exclusion Protocol. Checks directive syntax, path formats, Crawl-delay values, and Sitemap URLs. Previews crawl rules per user-agent group. Free and runs entirely in your browser.
Use Tool →API Response Formatter — JSON Pretty Printer
Format and beautify API responses for better readability. JSON formatter with minify and prettify options.
Use Tool →HTTP Header Analyzer — Security & CORS Audit
Parse and analyze HTTP request or response headers. Identifies categories, explains each header, flags missing security headers, and detects duplicates or suspicious values — entirely in your browser.
Use Tool →GitHub Actions Validator — Workflow Syntax & CI/CD Security Audit
Validate GitHub Actions workflow YAML for syntax errors, missing required fields, deprecated commands, mutable action refs, outdated action versions, and broken job dependencies. Get per-job results with fix hints in real time.
Use Tool →Nginx Config Generator — Performance-Optimized Server Configuration
Generate nginx server block configurations for static sites, reverse proxies, and PHP-FPM setups. Includes SSL best practices, gzip compression, security headers, and upstream blocks — updated in real time as you change options.
Use Tool →CIDR Calculator — IPv4 Subnet & Network Range Mapper
Calculate subnet ranges, usable host counts, broadcast addresses, and subnet masks from CIDR notation. Shows network and host addresses in both decimal and binary with color-coded bit visualization.
Use Tool →Share Your Feedback
Help us improve this tool by sharing your experience