AI with Hardened Container Images
Learning Lab for July 2025 on securing AI workloads with hardened container images
The Guardener migrates your Dockerfiles to use Chainguard Containers. It uses AI to iteratively convert instructions, build images, compare results, and fix issues until the Dockerfile works as expected.
You interact with it through chainctl agent dockerfile commands. The AI runs server-side and scans your workspace to perform its analysis. Docker builds and file access remain local to your machine, and only the data necessary for analysis is processed.
Note: The Guardener is currently in beta. Features and behavior may change before general availability.
While The Guardener is in beta, your organization will need to join the waitlist. We’ll notify you once registration becomes available. You can sign up for the waitlist on the The Guardener landing page.
Additionally, you will need the following in order to use The Guardener:
chainctl installed on your local machine. Refer to our installation guide to set this up if you haven’t already done sorepo.create capability within your Chainguard organization. Refer to our Built-in Roles and Capabilities Reference for more informationIf you encounter permission errors, check your available groups and verify role bindings:
chainctl iam organizations list -o table
chainctl iam role-bindings create --parent <group-id> --identity <identity> --role <role-with-repo.create>chainctl agent dockerfile includes the following subcommands which you can use to interact with The Guardener:
| Command | What it does |
|---|---|
build | Migrate a Dockerfile to a Chainguard equivalent image |
optimize | Optimize an already-migrated Dockerfile |
upgrade | Upgrade package versions in a Dockerfile |
validate | Validate a migrated Dockerfile |
The following examples demonstrate common usage of each subcommand.
To run a basic migration, provide the path to your Dockerfile and a target image tag:
chainctl agent dockerfile build -f Dockerfile \
-t myapp:chainguard \
--group <group-id>If your image requires build arguments, pass them with --build-arg:
chainctl agent dockerfile build -f Dockerfile \
-t myapp:chainguard \
--build-arg VERSION=1.0 \
--group <group-id>For CI environments or automated workflows, you can use the --non-interactive flag to skip prompts and automatically select the first suggestion:
chainctl agent dockerfile build -f Dockerfile \
--non-interactive \
--group <group-id>To resume a migration from a previously saved local state, use --resume:
chainctl agent dockerfile build -f Dockerfile \
--resume \
--group <group-id>To optimize an already-migrated Dockerfile:
chainctl agent dockerfile optimize -f Dockerfile \
--group <group-id>To run only specific optimizers, pass a comma-separated list with --optimizers:
chainctl agent dockerfile optimize -f Dockerfile \
--optimizers=cache,security \
--group <group-id>To upgrade outdated packages in a Dockerfile:
chainctl agent dockerfile upgrade -f Dockerfile \
--group <group-id>To preview what an upgrade would change without modifying any files, use the --dry-run flag:
chainctl agent dockerfile upgrade -f Dockerfile \
--dry-run \
--group <group-id>To validate a migrated Dockerfile:
chainctl agent dockerfile validate -f Dockerfile \
--group <group-id>During a migration, The Guardener performs the following steps:
syft (an open source SBOM generator).During this loop, the agent has access to tools for searching the Wolfi APKINDEX, finding which package provides a binary or library, comparing installed packages and filesystem layers, running commands in built images, and reading build context files (requirements.txt, package.json, etc.).
If the agent cannot resolve an issue automatically, it prompts you for guidance with suggested alternatives.
The entire loop can take from five to more than thirty minutes to complete, depending on the complexity of the Dockerfile.
When running the optimize subcommand, you can specify one or more of the following optimizers:
cache — Reorders instructions for better layer caching. The order of instructions determines where the build cache is invalidated. Reordering to take better advantage of layer caching leads to faster builds and reduced CI consumption.cleanup — Removes duplicate and redundant instructions. For example, copying one file vs COPY ..layers — Combines RUN commands and merges package installs. Reducing the number of layers results in a smaller image, faster pull times, and lower CI minute consumption.security — Adds --no-cache to apk, flags secrets, and suggests a non-root USER. Skipping the apk cache layer reduces image size, and using a non-root user limits root access to the host and removes the ability to install new packages at runtime.multi-stage — Transforms the Dockerfile into a multi-stage build using Chainguard runtime images. Chainguard containers come in a -dev variant with a package manager and shell, and a distroless runtime variant. Splitting into multiple stages produces a smaller runtime image with a reduced attack surface.native-packages — Replaces curl/bash installs with native apk packages, ensuring full provenance of packages rather than just the resulting binary.The Guardener has been tested with Python, Go, Node.js, Java, Spring Boot (UBI-based), and multi-stage Argo CD builds. The following example shows a simple Ubuntu-based Dockerfile converted to use cgr.dev/chainguard/wolfi-base:latest.
FROM ubuntu:22.04
RUN apt-get update && apt-get install -y curl git python3
WORKDIR /app
COPY . .
CMD ["python3", "app.py"]FROM cgr.dev/chainguard/wolfi-base:latest
RUN apk add --no-cache curl git python3
WORKDIR /app
COPY . .
CMD ["python3", "app.py"]You will need Docker installed and running locally, chainctl installed and authenticated, and a Chainguard organization that has joined the beta program.
Yes. Use --non-interactive to skip all prompts, and ensure your CI environment has Docker and a chainctl authentication token.
The Guardener’s chainctl commands can take anywhere from five to more than thirty minutes depending on the size and complexity of the Dockerfile. For example, the optimize subcommand takes longer than build because it performs a more in-depth analysis.
The Guardener is an AI-based tool, which means its behavior is inherently non-deterministic. You may see slightly different results across runs, even with the same inputs. This is expected.
The agent makes probabilistic decisions based on patterns in the data rather than following a fixed set of rules. As a result, it can take different but equally valid paths when analyzing a Dockerfile, choosing optimizations, or resolving build issues. The overall outcome should be consistent across runs, but the exact steps, suggestions, or ordering may vary.
A network interruption causes the bidirectional gRPC stream to terminate, ending the session immediately.
The --resume flag only resumes from locally saved migration state, not from the live session. The server-side agent, its conversation history, and any in-flight work are lost when the connection drops. There is currently no server-side session recovery.
Docker is required, since all builds happen on your local machine. A fully managed headless mode with server-side builds is planned for a future release.
Last updated: 2026-03-30 00:00