📄️ Scan Dependency Vulnerabilities
Nowadays, real world products often include lots of open source components. It's crucial to periodically scan these components to detect any security vulnerabilities and update them promptly to prevent potential attacks.
📄️ Scan Image Vulnerability Before Push
This tutorial explains how to build and scan a multi-arch docker image. Built image should only be pushed to registry if there are no HIGH severity vulnerabilities.
📄️ Promote Image If No Vulnerabilities Found
This tutorial explains how to scan existing docker image in registry, and promote it as to a different repository if no vulnerabilities found.