From 345905e0f108c69b91bcc5b67387c0cd3f3d76dc Mon Sep 17 00:00:00 2001 From: Pushkar Joglekar <3390906+PushkarJ@users.noreply.github.com> Date: Wed, 30 Nov 2022 19:42:59 -0800 Subject: [PATCH] Update supply-chain-security/compromises/2022/docker-hub-malicious-containers.md Signed-off-by: Pushkar Joglekar <3390906+PushkarJ@users.noreply.github.com> --- .../compromises/2022/docker-hub-malicious-containers.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/supply-chain-security/compromises/2022/docker-hub-malicious-containers.md b/supply-chain-security/compromises/2022/docker-hub-malicious-containers.md index 5f1601593..95e141466 100644 --- a/supply-chain-security/compromises/2022/docker-hub-malicious-containers.md +++ b/supply-chain-security/compromises/2022/docker-hub-malicious-containers.md @@ -6,7 +6,7 @@ Docker Hub is the largest library and community for container images. ## Impact -There are hundreds of thousands of publicly available container images at the freely available Docker Hub library. Researchers at Sysdig scanned over 250,000 unverified Linux images and identified 1,652 that were mailicious. Crypto-miners represented the largest category, though significant numbers of embedded secrets and proxy avoidance tools were also found. +There are hundreds of thousands of publicly available container images at the freely available Docker Hub library. Researchers at Sysdig scanned over 250,000 unverified Linux images and identified 1,652 that were malicious. Crypto-miners represented the largest category, though significant numbers of embedded secrets and proxy avoidance tools were also found. "Unfortunately, the size of the Docker Hub public library does not allow its operators to scrutinize all uploads daily; hence many malicious images go unreported.