#!/bin/bash
# A lame and quick script to run docker-bench-security in WebSploit Labs
# Omar Santos @santosomar


red=$(tput setaf 1)
green=$(tput setaf 2)
reset=$(tput sgr0)

echo "Running docker-bench-security ${red}WebSploit Labs easy script"
printf -- '\n';

docker run --rm --net host --pid host --userns host --cap-add audit_control \
    -e DOCKER_CONTENT_TRUST=$DOCKER_CONTENT_TRUST \
    -v /etc:/etc:ro \
    -v /lib/systemd/system:/lib/systemd/system:ro \
    -v /usr/bin/containerd:/usr/bin/containerd:ro \
    -v /usr/bin/runc:/usr/bin/runc:ro \
    -v /usr/lib/systemd:/usr/lib/systemd:ro \
    -v /var/lib:/var/lib:ro \
    -v /var/run/docker.sock:/var/run/docker.sock:ro \
    --label docker_bench_security \
    docker/docker-bench-security > bench_results.txt


cat bench_results.txt | grep WARN

printf -- '\n';
echo "${red}The output above only includes the major findings."

echo "${reset}The complete results have been stored at: 
${green}$(pwd)/bench_results.txt "