Your security team runs Trivy on every image before deployment. Green checkmarks across the board. But six months later, you discover a container has been running with an expired certificate, a vulnerable dependency that was added at runtime, and SUID binaries that weren't in the original image.
Without continuous capture:
Scan what's actually running, not just what was deployed.
$ reel export sbom -n prod api-server-pod --scanners vuln
Scanning live container...
PACKAGE VERSION VULNERABILITY SEVERITY
libssl3 3.0.2 CVE-2024-0727 HIGH
python3-requests 2.28.0 CVE-2024-35195 MEDIUM
...
Total: 312 packages, 0 CRITICAL, 2 HIGH, 5 MEDIUM$ reel export cbom -n prod api-server-pod
CERTIFICATES (8 found):
✓ api.example.com expires 2025-06-15 RSA-2048
⚠ internal-service.local expires 2024-12-22 RSA-2048 (12 days)
✗ legacy-api.internal expired 2024-11-01 RSA-1024 (weak)
PRIVATE KEYS (3 found):
⚠ /app/certs/legacy.key RSA-1024 (weak algorithm)Find expired certificates, weak algorithms, and key management problems.
ClamAV scanning catches threats that weren't in the original image.
$ reel export malware -n prod api-server-pod
Scanning filesystem...
THREATS DETECTED: 0
Files scanned: 12,847
Scan time: 4.2s$ reel export files -n prod api-server-pod --ioc
INDICATORS OF COMPROMISE:
SUID/SGID BINARIES (unexpected):
⚠ /usr/local/bin/nmap SUID root (not in base image)
⚠ /tmp/escalate SUID root (suspicious location)
HIDDEN FILES:
⚠ /var/www/.backdoor.php added 2024-12-10 03:15
⚠ /tmp/.X11-unix/.hidden added 2024-12-10 03:14
EXECUTABLES IN SUSPICIOUS LOCATIONS:
⚠ /tmp/nc netcat binary
⚠ /dev/shm/miner cryptocurrency miner
Files extracted to: ./ioc-export-20241210/Extract and monitor files that shouldn't be there—SUID binaries, hidden files, executables in /tmp, unauthorized scripts.
Catch suspicious files as they appear, not after the incident.
metadata:
annotations:
reel.io/schedule: |
# Extract IoC files every 5 minutes
*/5 * * * * | export files --ioc --alertInstead of assuming your production matches your scans, you know:
Your security posture reflects reality, not assumptions. Catch indicators of compromise before they become incidents.
Coming soon. Deploys in minutes. Join the waitlist for early access.