Skip to content

dhi: add malware scan info#24729

Open
craig-osterhout wants to merge 2 commits intodocker:mainfrom
craig-osterhout:issue-24728
Open

dhi: add malware scan info#24729
craig-osterhout wants to merge 2 commits intodocker:mainfrom
craig-osterhout:issue-24728

Conversation

@craig-osterhout
Copy link
Copy Markdown
Contributor

@craig-osterhout craig-osterhout commented Apr 14, 2026

Description

Summary

  • Add new Explore topic documenting how Docker scans DHI images for malware using ClamAV, including how to retrieve and verify the virus scan attestation
  • Update the base and customized build pipeline descriptions to include scanning (malware, secrets, vulnerabilities) as an explicit pipeline step
  • Add cross-references from the attestations page to the new malware scanning topic

Details

DHI images include a signed virus/malware scan attestation (https://scout.docker.com/virus/v0.1), but this wasn't documented anywhere beyond a one-line mention in the attestations table. This PR adds a dedicated Explore topic for it and integrates scanning into the build pipeline documentation.

The attestation content was verified by pulling actual attestations from both a base image (dhi.io/python:3.13) and a customized image (projectsteam/dhi-python-3:3.10-alpine3.22_curl). Key findings that informed the docs:

  • The virus scan uses ClamAV (clamav/clamav:stable), scanning all OCI blobs including archives
  • The attestation payload is JSON with a base64-encoded ClamAV report
  • Both base and customized images get virus, secrets, and vulnerability scanning
  • Only base images get the functional test attestation — customized images do not

Notable generated topics

Related issues or tickets

Closes #24728

Reviews

  • Editorial review

Signed-off-by: Craig Osterhout <craig.osterhout@docker.com>
@craig-osterhout craig-osterhout requested a review from a team April 14, 2026 16:19
@craig-osterhout craig-osterhout added status/review Pull requests that are ready for review area/dhi labels Apr 14, 2026
@craig-osterhout
Copy link
Copy Markdown
Contributor Author

/review

@netlify
Copy link
Copy Markdown

netlify bot commented Apr 14, 2026

Deploy Preview for docsdocker ready!

Name Link
🔨 Latest commit 2cbe02e
🔍 Latest deploy log https://app.netlify.com/projects/docsdocker/deploys/69de77b8e37fea0008e95a9a
😎 Deploy Preview https://deploy-preview-24729--docsdocker.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

Copy link
Copy Markdown
Contributor

@docker-agent docker-agent bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Assessment: 🟢 APPROVE

This PR adds comprehensive documentation for malware scanning in Docker Hardened Images. The changes are well-structured and follow the Docker documentation style guide.

What was reviewed:

  • New file: malware-scanning.md - Documents ClamAV-based virus scanning with clear examples
  • Updated: attestations.md - Added cross-references to the new malware scanning topic
  • Updated: build-process.md - Integrated scanning into the build pipeline diagrams
  • Updated: _index.md - Added navigation entry for the new topic

Quality checks passed:
✅ No AI-generated patterns (hedge words, meta-commentary, marketing speak)
✅ Proper front matter with all required fields
✅ Valid cross-references and links
✅ Correct goat diagram syntax
✅ Follows Docker documentation style guide
✅ Clear, concise, and technically accurate content
✅ Good use of callouts and code examples

The documentation is ready to merge.

Signed-off-by: Craig Osterhout <craig.osterhout@docker.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/dhi status/review Pull requests that are ready for review

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Document malware scanning in the DHI build pipeline

2 participants