You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Restructure the intro to lead with the problem (uncontrolled outbound
access) before the solution, merge the redundant "Why Use buildcage?"
section into the overview, and remove the firewall analogy.
**A secure Docker build environment that prevents supply chain attacks by restricting outbound network access during image builds.**
14
+
**Secure your Docker builds against supply chain attacks — restrict outbound network access to only the domains you allow.**
15
15
16
-
buildcage is a GitHub Actions-ready Docker container that runs a custom BuildKit builder. When you configure Docker Buildx to use buildcage as a remote builder, all network traffic from `RUN` steps in your Dockerfile is routed through an internal proxy that can log and block connections based on domain name.
16
+
When you run `RUN npm install` or `RUN apt-get install` in a Dockerfile, those commands can reach any server on the internet — and you have no visibility or control over where they connect. A compromised dependency could silently exfiltrate your build secrets or phone home to an attacker's server.
17
17
18
-
You define a list of allowed domains, and only connections to those domains are permitted during builds — everything else is blocked.
18
+
buildcage prevents this. You define a list of allowed domains, and only those connections are permitted during builds. Everything else is blocked.
19
19
20
-
*Think of it as a firewall for your Docker builds.*
21
-
22
-
## Why Use buildcage?
23
-
24
-
When you run `RUN npm install` or `RUN apt-get install` in a Dockerfile, these commands can connect to any server on the internet. **You have no visibility or control over where they connect.**
25
-
26
-
buildcage solves this by restricting outbound network access during builds to only the domains you explicitly allow.
20
+
No Dockerfile changes required. No certificates to install. Works with any language or package manager.
0 commit comments