diff --git a/README.md b/README.md
index 95e7c7b..b78e8a8 100644
--- a/README.md
+++ b/README.md
@@ -1,5 +1,6 @@
 # cwe_checker #
 [![Codacy Badge](https://api.codacy.com/project/badge/Grade/9dbf158110de427d893b40ba397b94bc)](https://www.codacy.com/app/weidenba/cwe_checker?utm_source=github.com&utm_medium=referral&utm_content=fkie-cad/cwe_checker&utm_campaign=Badge_Grade)
+![Docker-Badge](https://img.shields.io/docker/build/fkiecad/cwe_checker.svg)
 ## What is cwe_checker? ##
 *cwe_checker* detects common bug classes such as use of dangerous functions and simple integer overflows. These bug classes are formally known as [Common Weakness Enumerations](https://cwe.mitre.org/) (CWEs). Its main goal is to aid analysts to quickly find vulnerable code paths.