Available Images
Full Image (Recommended)
Includes both OpenGrep and Semgrep scanners.- OpenGrep 1.12.1+ included
- Semgrep 1.119.0+ included
- All scanning capabilities available
Slim Image
A minimal image containing only thecrypto-finder binary. An external scanner
(OpenGrep or Semgrep) must be provided — for example, by mounting it into the
container or by building a derived image.
crypto-finderbinary only- Requires an externally supplied OpenGrep or Semgrep installation
- Smaller image size
- Suitable for workflows that manage scanner versions independently
Basic Usage
Scanning with Mounted Volumes
The examples below use$(pwd) to reference the current working directory.
Replace YOUR_SCANOSS_API_KEY with a valid SCANOSS API key.
Note:--no-remote-rulesdisables the automatic download of rulesets from the SCANOSS platform. Use this flag when supplying rule files locally via--rules-dir.
Volume Mounting Patterns
| Mount Point | Purpose | Recommended Mode |
|---|---|---|
/workspace/code | Source code to scan | :ro (read-only) |
/workspace/rules | Local rule files | :ro (read-only) |
/workspace/output | Scan output files | :rw (read-write) |
~/.scanoss/crypto-finder/cache | Ruleset cache (optional) | :rw (read-write) |
Preserving Cache Between Runs
Using a named Docker volume avoids re-downloading rulesets on each run.CI/CD Integration
GitHub Actions
The workflow below runs Crypto Finder on every push and pull request. It assumes that the source code to scan is located undersrc/ within the
repository root.
With Custom Rules
Advanced Docker Usage
Specifying a Scanner
By default, Crypto Finder uses OpenGrep. Use the--scanner flag to select
Semgrep instead.
Custom Timeout and Language Override
Docker Compose
The followingdocker-compose.yml example is intended for local development use.
Set SCANOSS_API_KEY in your environment or in a .env file before running.