Dive into the image version card for a detailed vulnerability report, digest history, SBOM, and detailed specification
docker pull reg.mini.dev/{token}/go:1.23.8-dev-202504210029
SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt
openvex.json
file for each image digest. The file lists all vulnerabilities detected for that image (based on its SBOM) and their status.
A typical workflow is:
vexctl
to filter the scan results using the VEX document. For example:
fixed
or not affected
)vulnerable_code_not_present
or component_not_present
and the impact statement provides more specific details for the decision.