Skip to main content
Version: v0.29.0

regis:0.18.0

Command

pipenv run regis analyze ghcr.io/trivoallan/regis:0.18.0 --evaluate --site --output-dir docs/website/static/examples/playbooks/default/regis

Playbook used

This example uses the default Regis playbook, which evaluates security, compliance, and image metadata against a comprehensive set of checks.

What to expect

The Regis CLI image is a multi-tool container bundling Skopeo, Trivy, Hadolint, and Dockle. Unlike minimal base images, this is a feature-rich image with comprehensive tooling. It is larger in size but comes with well-defined metadata labels and built-in supply chain provenance evidence.

Key findings

Regis CLI examples typically exhibit:

  • Size: Larger footprint due to included tooling (moderate score)
  • Labels: Comprehensive metadata and documentation labels
  • Provenance: Supply chain evidence and build provenance data
  • SBOM: Complete Software Bill of Materials with detailed component tracking
  • Security: Regular updates and vulnerability scanning

Interpreting the report

For guidance on how scores are calculated and what each metric means, see Scoring and Reports.

View the report

Browse the generated report at /examples/playbooks/default/regis/index.html