Image Overview

Public Grype Image vs. Minimus Hardened Grype Image

Grype Image Overview

The Grype image contains the scanner runtime binary, dependency resolver and core libraries, the vulnerability data updater, and SBOM parsers. It ships CLI entrypoints, documented exit codes, and the runtime hooks needed to scan container images, filesystems, and supplied SBOMs.

In containerized and production environments it runs as a CI job, build-stage step, sidecar, or scheduled scanner against registries and nodes. Typical workloads include image vulnerability scanning, filesystem audits, automated gate checks in pipelines, and periodic registry sweeps against a pinned vulnerability database.

Teams evaluate a Grype hardened image in secure or regulated environments to meet hardening baselines: minimized packages, constrained runtime privileges (non‑root), fixed cryptographic/configuration choices, reproducible builds and signed artifacts reduce attack surface and simplify audit evidence.

Minimus Grype Image

CIS
NIST
FIPS 140-3
STIG

The Minimus Grype image differs from typical Grype container images by being built from scratch with only the essential runtime components and tooling, which dramatically reduces the number of installed packages and surface area exposed to attackers. This minimal construction makes the image faster to start, lighter to distribute, and easier to maintain and patch compared to fuller-featured base images, while preserving the scanner functionality you expect from Grype.

As a result of this focused design, the Minimus hardened Grype image is also hardened to industry guidance such as NIST SP 800-190 and relevant CIS Benchmarks, with configuration and build-time controls that simplify auditability and enforcement of secure defaults—benefits that matter to engineers and security teams managing container supply chains and runtime posture.

Get Started

Try the Minimus Hardened Grype Image

Get access to the Minimus platform, with thousands of hardened container images, supply chain protection, native compliance reporting, and seamless integrations to your existing development toolchain.
Secure, Minimal Container Images
Hardened to NIST and CIS standards with FIPS 140-3 and STIG ready images available.

Supply Chain Protection

Defend against malicious packages with advanced heuristic filtration

Custom Image Creation

Create your own hardened images with the packages, files and certs you need. Minimus handles updates automatically.

Get a Demo of Minimus

Just fill out the form, and we'll be in touch to schedule a demo of Minimus with one of our engineers.
Thank you! A member of our team will reach out shortly to schedule a personalized Minimus demo.
Oops! Something went wrong while submitting the form.
Frequently Asked Questions

Grype Container Image FAQ

Answers to common questions about Grype and the Minimus Hardened Grype Image
What is Grype used for?

Grype is an open-source vulnerability scanner for container images and SBOMs. It analyzes a target image or SBOM against publicly maintained vulnerability databases to surface known risks, vulnerable packages, and CVEs. It can scan local images, remote registries, or SBOMs, and it produces a report with severities and fix guidance.

Use Grype in CI/CD pipelines to enforce security gates and to continuously monitor images before deployment. You can scan a hardened Grype image for vulnerabilities. Example:

grype your-image:tag
What is the risk score for Grype?

There is no single, universal risk score for Grype. Risk is not intrinsic to the scanner; it depends on the vulnerabilities found in the target container image and their severities (for example, CVSS).

If you scan a container image with Grype, the risk score comes from the vulnerability findings and their exposure, not from the tool itself.

To reduce risk, keep the scanner up to date and use a hardened Grype image, following best practices for image hardening and supply-chain security.

What is the difference between Syft and Grype?

Syft is an SBOM (software bill of materials) generator that inventories a container image or filesystem, listing packages, licenses, and components.

Grype is a vulnerability scanner that consumes an SBOM from Syft or scans an image directly to report CVEs, vulnerabilities, and license risks.

Together, generate a SBOM with Syft and then scan with Grype to produce an actionable report.

For best security, use a hardened Grype image.

Can I replace my Grype image with the Minimus Hardened Grype Image?
Yes. The Minimus Grype image contains everything you need to run Grype successfully.
Does Minimus offer FIPS 140-3 images?
Yes, Minimus images are hardened to CIS and NIST standards, with FIPS 140-3 and STIG ready variants available.