Docker Socket Proxy
Security-enhanced proxy to restrict Docker socket API access
Docker Socket Proxy is a security-enhanced proxy for the Docker socket.
- It sits between clients and the Docker daemon and blocks access to sensitive API endpoints based on per-endpoint allow/deny rules driven by environment variables.
- The proxy runs as an Alpine-based HAProxy container and uses a small configuration to enforce the ACLs, returning HTTP 403 Forbidden for disallowed requests.
Key Features
- ACL-driven access control via environment variables that map to Docker API prefixes (eg. /auth, /containers, /images, /volumes, etc.).
- Default allowances for safe endpoints (eg. EVENTS, PING, VERSION) with fine-grained revocation for security-critical areas.
- Simple deployment model: run a privileged container that mounts the host Docker socket and exposes a proxy port.
- Socket-location flexibility via SOCKET_PATH to support non-standard Docker socket paths.
- Configurable logging through a LOG_LEVEL setting.
- Clear security guidance: avoid exposing the proxy publicly and rely on Docker network isolation.
- Image tagging supports versioned releases, latest, and edge builds for development.
Use Cases
- Expose Docker API to a single service or CI tool with restricted permissions, reducing blast radius if the service is compromised.
- Place the proxy behind a network firewall or within a private network segment to limit access to the Docker daemon.
- Point clients to the proxy (via DOCKER_HOST=tcp://host:2375) instead of the raw Docker socket to enforce ACLs without changing client code.
Limitations and Considerations
- TLS support is not included; the proxy provides a plain HTTP front for the host Docker socket. Plan to terminate TLS at a separate layer or keep the proxy on a secured network.
- The container must run privileged because it connects to the Docker socket, which carries security implications.
- Some workflows may require enabling additional API sections; review and adjust environment variables to match your needs.
Conclusion
Docker Socket Proxy offers a straightforward ACL-based barrier between clients and the Docker daemon, enabling safer integrations where Docker access is necessary but tightly controlled. It is quick to deploy in a containerized environment, but requires careful network and permission configurations to maintain security.
Categories:
Tags:
Tech Stack:
Similar Services

Netdata
Real-time, per‑second full‑stack monitoring and observability
Open-source, agent-based monitoring platform delivering per-second metrics, edge ML anomaly detection, tiered time-series storage and centralized cloud UI.

Coolify
Self-hosted PaaS for deploying apps, databases, and services
Open-source, self-hostable PaaS to deploy websites, full-stack apps, databases, and Docker services on your own servers with Git-based CI/CD workflows.

Portainer
Web UI and API for managing Docker and Kubernetes environments
Lightweight web-based platform to manage Docker, Swarm and Kubernetes resources with a GUI and API, including access control and multi-environment operations.


CasaOS
Personal cloud dashboard and app store for Docker-based home servers
Open-source personal cloud system with a web dashboard, app store, and file management to run and manage Docker apps on home servers and SBCs.


Dokku
Docker-powered PaaS for deploying apps on a single host
Dokku is a self-hosted, Docker-based mini PaaS that lets you deploy Heroku-style apps via Git push, using buildpacks or Dockerfiles with plugin-managed services.

Dokploy
Self-hosted PaaS to deploy and manage containerized apps and databases.
Open-source self-hostable PaaS for deploying containerized applications and managing databases with Docker Compose, Traefik, monitoring, and backups.
Go
Docker