Skip to main content

Scan with Veracode Container Security

Veracode Container Security scans return vulnerability data and policy evaluations based on several categories of findings.

Before you begin:

To complete this task:

  1. At the command prompt, run this command: ./veracode configure.

  2. When prompted, enter the API ID and secret key you generated in the Veracode Platform.

  3. Run the scan command with the appropriate target type, target, and flags. For example:

    ./veracode scan --source alpine:latest --type image

    To print the output to a file, add the -o flag. You can share this file or save it as an artifact in a pipeline. For example:

    ./veracode scan --source alpine:latest --type image -o alpine-latest.json
  4. Review the results.