You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<!--Delete sections as needed -->
## Description
### Summary
- Add new Explore topic documenting how Docker scans DHI images for
malware using ClamAV, including how to retrieve and verify the virus
scan attestation
- Update the base and customized build pipeline descriptions to include
scanning (malware, secrets, vulnerabilities) as an explicit pipeline
step
- Add cross-references from the attestations page to the new malware
scanning topic
### Details
DHI images include a signed virus/malware scan attestation
(`https://scout.docker.com/virus/v0.1`), but this wasn't documented
anywhere beyond a one-line mention in the attestations table. This PR
adds a dedicated Explore topic for it and integrates scanning into the
build pipeline documentation.
The attestation content was verified by pulling actual attestations from
both a base image (`dhi.io/python:3.13`) and a customized image
(`projectsteam/dhi-python-3:3.10-alpine3.22_curl`). Key findings that
informed the docs:
- The virus scan uses **ClamAV** (`clamav/clamav:stable`), scanning all
OCI blobs including archives
- The attestation payload is JSON with a base64-encoded ClamAV report
- Both base and customized images get virus, secrets, and vulnerability
scanning
- Only base images get the functional **test** attestation — customized
images do not
### Notable generated topics
-
https://deploy-preview-24729--docsdocker.netlify.app/dhi/explore/malware-scanning/
-
https://deploy-preview-24729--docsdocker.netlify.app/dhi/explore/build-process/
## Related issues or tickets
Closes#24728
## Reviews
<!-- Notes for reviewers here -->
<!-- List applicable reviews (optionally @tag reviewers) -->
- [ ] Editorial review
---------
Signed-off-by: Craig Osterhout <craig.osterhout@docker.com>
Copy file name to clipboardExpand all lines: content/manuals/dhi/core-concepts/attestations.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -82,7 +82,7 @@ For more details, see [Verify image attestations](../how-to/verify.md#verify-ima
82
82
| Scout SBOM | An SBOM generated and signed by Docker Scout, including additional Docker-specific metadata. |
83
83
| Secrets scan | Results of a scan for accidentally included secrets, such as credentials, tokens, or private keys. |
84
84
| Tests | A record of automated tests run against the image, such as functional checks or validation scripts. |
85
-
| Virus scan | Results of antivirus scans performed on the image layers. |
85
+
| Virus scan | Results of antivirus scans performed on the image layers. For details, see [Malware scanning](../explore/malware-scanning.md).|
86
86
| CVEs (Scout format) | A vulnerability report generated by Docker Scout, listing known CVEs and severity data. |
87
87
| SLSA provenance | A standard [SLSA](https://slsa.dev/) provenance statement describing how the image was built, including build tool, parameters, and source. |
88
88
| SLSA verification summary | A summary attestation indicating the image's compliance with SLSA requirements. |
@@ -130,7 +130,7 @@ For more details, see [Verify Helm chart attestations](../how-to/verify.md#verif
130
130
| Scout SBOM | An SBOM generated and signed by Docker Scout, including the chart and container images it references, with additional Docker-specific metadata. |
131
131
| Secrets scan | Results of a scan for accidentally included secrets, such as credentials, tokens, or private keys, in the chart package. |
132
132
| Tests | A record of automated tests run against the chart to validate functionality and compatibility with referenced images. |
133
-
| Virus scan | Results of antivirus scans performed on the chart package. |
133
+
| Virus scan | Results of antivirus scans performed on the chart package. For details, see [Malware scanning](../explore/malware-scanning.md).|
134
134
| CVEs (Scout format) | A vulnerability report generated by Docker Scout, listing known CVEs and severity data for the chart's referenced images. |
135
135
| SLSA provenance | A standard [SLSA](https://slsa.dev/) provenance statement describing how the chart was built, including build tool, source repository, referenced images, and build materials. |
136
136
| SPDX SBOM | An SBOM in [SPDX](https://spdx.dev/) format, listing the chart and all container images and tools it references. |
0 commit comments