cr.root.io, pulling a secure image, and verifying its patch coverage.
Prerequisites
- Docker Desktop (macOS) or Docker Engine (Linux) installed and running
- Access to Root Image Catalog — contact Root to get credentials
- A scanner for verification (recommended: Trivy —
brew install trivy)
Step 1: Subscribe to an Image
- Open Image Catalog in the Root platform UI
- Find the image family you want (for example, Python 3.12)
- Click Subscribe
- Verify it appears in your Inventory
Step 2: Authenticate to cr.root.io
Generate an API token from the Root UI, then authenticate Docker:Step 3: Pull a Secure Image
Replace your existing image reference with the Root equivalent. Tags are identical:Step 4: Update Your Dockerfile
Step 5: Verify with Trivy
Run a side-by-side scan to confirm vulnerability reduction:Some low-severity findings may still appear in scanner output. Download the SBOM and VEX artifacts from the Root UI or API to provide auditors with full remediation documentation — VEX statements tell scanners like Trivy which findings are fixed and why they’re not exploitable.