Transport Prefixes
Transport prefixes tell Check Image where to load the image from. When no prefix is specified, the tool tries the local Docker daemon first, then falls back to a remote registry.Supported Transports
docker://
Docker daemon or remote registry (default)
oci:
OCI layout directory on disk
oci-archive:
OCI tarball archive
docker-archive:
Docker tarball created with
docker saveDefault Behavior (No Prefix)
When you don’t specify a transport prefix, Check Image uses a fallback strategy:- Try Docker daemon: Looks for the image in the local Docker daemon
- Fall back to registry: If not found locally, fetches from the remote registry
When no tag is specified,
:latest is automatically appended to the image reference.OCI Layout Directory (oci:)
Load images from an OCI image layout directory on disk. This is useful for validating images that have been built or exported to a directory structure.
Syntax
Examples
OCI Archive (oci-archive:)
Load images from OCI tarball archives. The archive is extracted to a temporary directory during processing and automatically cleaned up afterward.
Syntax
Examples
Security Features
Path Traversal Protection
Path Traversal Protection
The extraction process validates all paths to prevent malicious archives from writing files outside the temporary directory.
Decompression Limit
Decompression Limit
A 5GB decompression limit prevents decompression bomb attacks. If an archive expands beyond this limit, the operation is aborted.
Supported Formats
Supported Formats
Both gzipped (
.gz, .tgz) and uncompressed tarballs are supported.Creating OCI Archives
Docker Archive (docker-archive:)
Load images from Docker tarball archives created with docker save. This format is compatible with Docker’s native save/load mechanism.
Syntax
The tag includes the full image name and tag as it appears in the archive (e.g.,
nginx:latest, myapp:2.0).Examples
Creating Docker Archives
Fallback Behavior
- With Prefix
- Without Prefix
Special Cases
Registry Command Validation
Theregistry command validates that an image comes from a trusted registry. This check is automatically skipped for non-registry transports:
When the registry check is skipped due to transport type, the validation passes by default and the output indicates the check was skipped.
Windows Path Support
The transport parser handles Windows drive letters correctly:Windows paths
Best Practices
Use explicit transports for predictable behavior
When working with files or directories, always use the appropriate transport prefix (
oci:, oci-archive:, docker-archive:) to avoid ambiguity.Prefer OCI formats for portability
OCI layout and OCI archives are vendor-neutral formats that work across different container runtimes.
Specify digests for reproducibility
When possible, use digest references (
@sha256:...) instead of tags for guaranteed reproducibility.Related Topics
Authentication
Learn how to authenticate with private registries
Configuration Files
Understand policy and configuration file formats
Output Formats
Control output format and color modes
Commands
Explore all available validation commands