1. Healthcheck completeness
Paste a compose file and click Audit
2. Env var bridge map
Paste a compose file and click Audit
3. Port collision grid
Paste a compose file and click Audit
4. Secrets Scan
Paste a compose file and click Audit
Paste your compose file. Audit healthchecks, secrets, port collisions and env vars instantly.
Paste a compose file and click Audit
Paste a compose file and click Audit
Paste a compose file and click Audit
Paste a compose file and click Audit
Paste your docker-compose.yml — optionally add your .env file for full variable bridging.
Click Audit. The tool scans all services for missing healthchecks, hardcoded secrets, port collisions and missing env vars.
Each finding includes an explanation and a suggested fix. Nothing leaves your browser.
It scans your compose file for missing healthchecks, hardcoded secrets in environment blocks, port collisions, services bound to 0.0.0.0, and missing restart policies.
A hardcoded secret is when you write a literal value like PASSWORD=mysecret directly in your compose file instead of using a variable reference like PASSWORD=${MY_SECRET}. Hardcoded secrets can be accidentally committed to version control.
No. Parsing happens entirely in your browser. Your compose file never leaves your machine.
A port collision is when two services in the same compose file map to the same host port. Only one service can bind to a host port at a time — the second one will fail to start.
This tool is designed for docker-compose.yml files only. It does not support Swarm deploy configs or Kubernetes manifests.