ConfigSentry

Guardrails for docker-compose.yml.

A tiny CLI linter that catches security + reliability footguns before they hit prod.

View on GitHub Run it in 60 seconds
CI-friendly exit codes Actionable fixes MIT licensed

Why

Compose files grow organically. A single line like privileged: true or mounting /var/run/docker.sock can silently turn a container into “root on host”. ConfigSentry surfaces the riskiest patterns early — locally or in CI.

Install & run

git clone https://github.com/alfredMorgenstern/configsentry
cd configsentry
npm ci
npm run build
node dist/cli.js ./docker-compose.yml

Tip: use the exit code (0=clean, 2=findings) to fail pipelines.

What it checks (MVP)

Roadmap

  1. Publish to npm (configsentry)
  2. GitHub Action wrapper (fail PRs with annotated findings)
  3. SARIF output for GitHub “Code scanning”
  4. Baselines/suppressions for incremental adoption
  5. Autofix mode for safe transforms

Pricing (later)

The core linter stays open source. If there’s demand, a Pro tier can add PR comments, SARIF, baselines, and policy packs for common stacks.