Stop relying on static scanners. BattleChip is an eBPF firewall that forces your containers to adhere to a strict whitelist. If you didn't define it, the Kernel kills it.
Why your WAF and Image Scanners aren't enough.
Image Scanners & Linters
RCE, Shells, File Access, 0-Days
WAFs & API Gateways
See exactly how kernel-level enforcement breaks the attack chain.
ATTACK VECTOR: Malicious JNDI string > Java Connects Outbound > Downloads Class > Executes Shell.
/bin/sh. Shell privileges revoked at runtime. SIGKILL SENT.
ATTACK VECTOR: Data Binding Exploit > Write JSP Webshell to Root > Execute Command.
tomcat binary restricted to specific log directories. Write attempt to webroot returns -EPERM.
whoami. Binary not in allowlist. EXECUTION DENIED.
ATTACK VECTOR: Kernel Exploit > Overwrite System Binary > Persistence.
file_permission hook intercepts write attempt.
BattleChip installs eBPF hooks directly into the Linux Kernel to police container activity.
Afraid of breaking production? Run BattleChip in Audit Mode first. We log every violation without blocking traffic. See exactly what would have been blocked before you flip the switch.
When you're ready, enable Kill Mode. If a container violates policy, we don't just block the syscallβwe terminate the entire container instantly. Fail secure.
Prevent data exfiltration. Allow your `node` binary to talk to the internet, but block `curl`, `wget`, and `sh` from sending a single packet.
Stop hand-writing JSON. Run BattleChip in Learn Mode. We watch your container, map its behavior, and generate a tight, least-privilege policy for you.
Drop-in protection for Docker Compose.