regis:0.18.0
Command
pipenv run regis analyze ghcr.io/trivoallan/regis:0.18.0 --evaluate --site --output-dir docs/website/static/examples/playbooks/default/regis
Playbook used
This example uses the default Regis playbook, which evaluates security, compliance, and image metadata against a comprehensive set of checks.
What to expect
The Regis CLI image is a multi-tool container bundling Skopeo, Trivy, Hadolint, and Dockle. Unlike minimal base images, this is a feature-rich image with comprehensive tooling. It is larger in size but comes with well-defined metadata labels and built-in supply chain provenance evidence.
Key findings
Regis CLI examples typically exhibit:
- Size: Larger footprint due to included tooling (moderate score)
- Labels: Comprehensive metadata and documentation labels
- Provenance: Supply chain evidence and build provenance data
- SBOM: Complete Software Bill of Materials with detailed component tracking
- Security: Regular updates and vulnerability scanning
Interpreting the report
For guidance on how scores are calculated and what each metric means, see Scoring and Reports.
View the report
Browse the generated report at /examples/playbooks/default/regis/index.html