RamaLama’s approach
- Distroless, minimal images to reduce attack surface
- Frequent rebuilds to incorporate upstream fixes
- Least-privilege defaults: rootless, no new privileges, dropped capabilities
- No network by default when running models (
--network=none)
How to scan images
Use popular scanners locally to audit the specific image/tag you deploy:- Severity and exploitability
- Whether the component is even present in the runtime path
- Availability of fixes and planned update cadence
Keeping risk low
- Pin specific image versions and update regularly
- Avoid granting elevated privileges to runtime pods/containers
- Prefer CPU-only images on nodes without GPUs
- Use SBOMs (see next page) to verify what’s inside
