cr.root.io, pulling a secure image, and verifying its patch coverage.
Prerequisites
- Docker Desktop (macOS) or Docker Engine (Linux) installed and running
- Access to Root Image Catalog - contact Root to get credentials
- A scanner for verification (recommended: Trivy -
brew install trivy)
Step 1: Subscribe to an Image
- Open Image Catalog in the Root platform UI
- Find the image family you want (for example, Python 3.12)
- Click Subscribe
- Verify it appears in your Inventory
Step 2: Authenticate to cr.root.io
Generate an API token from the Root UI, then authenticate Docker:Step 3: Pull a Secure Image
Replace your existing image reference with the Root equivalent. Tags are identical:Step 4: Update Your Dockerfile
Step 5: Verify with Trivy
Run a side-by-side scan to confirm vulnerability reduction:Some low-severity findings may still appear in scanner output. Download the SBOM and VEX artifacts from the Root UI or API to provide auditors with full remediation documentation - VEX statements tell scanners like Trivy which findings are fixed and why they’re not exploitable.
Next Steps
Supported Images
See all available image families and tags.
Root Patches for Images
Learn how patches are applied and what artifacts ship with each image.