Minimus Package Comparison: Understanding What’s Inside Your Container Image

By
Yakir Zagron
March 12, 2026

One of the key differences between Minimus images and standard container images is the amount of software included in the runtime environment.

Traditional container images inherit a large number of packages from their base distribution. These packages often include utilities, libraries, and system components that are not required by the application but still remain part of the image. While they may not be actively used by the application, they increase the overall attack surface and can introduce additional vulnerabilities.

Minimus images take a different approach by building minimal, distroless runtime images that contain only the packages necessary for the application to run.

Minimus Package Count & Risk Comparison

To make this difference easy to visualize, Minimus includes a Package Count & Risk Comparison between the Minimus image and the corresponding public image. This comparison highlights how many packages are included in each image and shows how much unnecessary software has been removed.

In many cases, the difference is significant. A typical public image may contain hundreds of packages inherited from the base operating system, while the Minimus image contains only the minimal set required at runtime.

Example: Minimus Node Image Package Comparison

Package Count and Risk Comparison for Minimus Node Image

For example, the public node image contains over 500 packages, while the Minimus node image includes only a few dozen packages. These remaining packages consist of essential runtime components such as core libraries, certificate bundles, and minimal system utilities required by the application.

Understanding the Minimus Package Visualization

The  Minimus package count view can be found inside the “Risk Reduction” tab for each Minimus image. Each square represents a single package included in the image. This makes it easy to immediately see the scale of the difference between the Minimus and public images.

In the public image section, packages are also separated between the base layer and additional layers. The base layer represents the operating system packages included in the image, such as system libraries and core utilities. Additional layers represent packages introduced when the image is built or extended for a specific application. This view helps illustrate how container images accumulate software components and where most of the packages in the image originate.

Each package in the comparison is also color-coded according to the highest severity level of the vulnerabilities associated with that package, making it easy to identify which components introduce higher security risks.

The Minimus package Visualization allows users to quickly see not only how many packages exist in the image, but also how security risk is distributed across those components.

Package-Level Vulnerability Comparison

In addition to the package visualization, Minimus also provides a detailed package comparison for each image. This view shows every package included in the Minimus image and the corresponding public image, along with the number of vulnerabilities affecting each package.

Minimus Detailed Package Comparison, showing Minimus node image packages.

Minimus Detailed Package Comparison, showing public node image packages.

This makes it possible to examine not only the total number of vulnerabilities in an image, but also which packages introduce them.

To illustrate this difference, the table below compares several images and highlights the differences in package count and current vulnerability exposure between Minimus images and the corresponding public images.

Image Minimus Packages Public Packages Package Reduction Minimus CVEs Public CVEs CVE Reduction
Node 15 565 97.3% 0 303 100%
Python 25 472 94.7% 2 272 99.3%
Postgres 44 149 70.5% 0 74 100%
OpenClaw 39 1327 97.1% 0 318 100%

Minimize Your Runtime Environment

By reducing the number of packages included in the runtime environment, Minimus images remove large portions of unnecessary dependencies and components that could introduce vulnerabilities. Request a demo to explore how these container runtime differences apply to your own workloads.

Yakir Zagron
Backend Developer
Sign up for minimus

Avoid over 97% of container CVEs

Access hundreds of hardened images, secure Helm charts, the Minimus custom image builder, and more.