Drop-in
Replace only the FROM line.
CVE-free container images built on a hardened minimal base. Stop patching vulnerabilities. Start shipping with confidence.
Why ImageSentinel
Hardened, CVE-free images with developer-friendly pricing. Just change the FROM line.
Replace only the FROM line.
Developer-friendly pricing; no enterprise tax.
Rebuilt, signed, provenance-backed.
Full SBOM and attestations.
How It Works
One line change. Zero CVEs. Full provenance.
Dockerfile
docker build
imagesentinel
push
verified
# Before
FROM node:20-slim
# After
FROM imagesentinel.io/node:20
# That's it. Zero CVEs.- name: Harden image
run: |
imagesentinel harden my-app:latest \
--sign \
--sbom \
--push imagesentinel.io/my-app:latestCore Pillars
Sigstore signatures with transparency log—verify authenticity before every deploy.
Tamper-proof build attestations prove exactly how each image was created.
Complete dependency inventory for audits, license checks, and incident response.
Non-root execution limits blast radius if a container is ever compromised.
The Difference
Example data shown. Verify with our demo images and SBOM.
Technical Details
Complete transparency. Machine-readable attestations. Verifiable at every step.
{ "spdxVersion": "SPDX-2.3", "name": "imagesentinel.io/node:20", "packages": [ { "name": "nodejs", "version": "20.10.0-r0", "supplier": "ImageSentinel Build System", "checksums": [{ "algorithm": "SHA256", "value": "a1b2c3d4..." }] }, { "name": "openssl", "version": "3.2.0-r0", "supplier": "ImageSentinel Build System" } ], "vulnerabilities": []}$ cosign verify imagesentinel.io/node:20 Verification for imagesentinel.io/node:20 --The following checks were performed: ✓ Signature verified ✓ SBOM attestation found ✓ SLSA provenance verified ✓ Transparency log entry found [{ "critical": { "identity": { "issuer": "https://imagesentinel.io" } }}]Join the private beta. Get hardened CVE-free container images for your stack in under 5 minutes.