Projects
Overview of Anchore Open Source tools
Overview of Anchore Open Source tools
Use Syft to generate your first SBOM from container images, directories, or archives.
Architecture and design of the Syft SBOM tool
Developer guidelines when contributing to Syft
Explore the different scan targets Syft supports including container images, OCI registries, directories, files, and archives.
Learn how to create a Software Bill of Materials (SBOMs) for container images, filesystems, and archives using Syft.
Guidelines for developing & contributing to Anchore Open Source projects
Choose from multiple SBOM output formats including SPDX, CycloneDX, and Syft’s native JSON format.
Learn how to scan container images and filesystems for software licenses covering detection, compliance checking, and managing license obligations.
Learn how to work with Syft’s native JSON format including querying with jq, extracting metadata, and understanding the SBOM structure.
Configure which package catalogers Syft uses to discover software components including language-specific and file-based catalogers.
Verifying release assets after downloading
Control which files and directories Syft includes or excludes when generating SBOMs.
Create custom SBOM output formats using Go templates with available data fields to build tailored reports for specific tooling or compliance requirements.
Convert existing SBOMs between different formats including SPDX and CycloneDX using Syft’s experimental conversion capabilities.
Configure authentication for scanning container images from private registries using credentials, registry tokens, and credential helpers.
Generate cryptographically signed SBOM attestations using in-toto and Sigstore to create, verify, and attach attestations to container images for supply chain security.
Configuration patterns and options used across all Anchore OSS tools