diff --git a/data/scout-cli/docker_scout.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout.yaml
similarity index 96%
rename from data/scout-cli/docker_scout.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout.yaml
index 57c644c4f8..4204e61c52 100644
--- a/data/scout-cli/docker_scout.yaml
+++ b/_vendor/github.com/docker/scout-cli/docs/docker_scout.yaml
@@ -15,6 +15,7 @@ cname:
- docker scout help
- docker scout integration
- docker scout policy
+ - docker scout push
- docker scout quickview
- docker scout recommendations
- docker scout repo
@@ -30,6 +31,7 @@ clink:
- docker_scout_help.yaml
- docker_scout_integration.yaml
- docker_scout_policy.yaml
+ - docker_scout_push.yaml
- docker_scout_quickview.yaml
- docker_scout_recommendations.yaml
- docker_scout_repo.yaml
diff --git a/data/scout-cli/docker_scout_attestation.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_attestation.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_attestation.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_attestation.yaml
diff --git a/data/scout-cli/docker_scout_attestation_add.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_attestation_add.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_attestation_add.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_attestation_add.yaml
diff --git a/data/scout-cli/docker_scout_cache.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_cache.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_cache.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_cache.yaml
diff --git a/data/scout-cli/docker_scout_cache_df.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_cache_df.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_cache_df.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_cache_df.yaml
diff --git a/data/scout-cli/docker_scout_cache_prune.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_cache_prune.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_cache_prune.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_cache_prune.yaml
diff --git a/data/scout-cli/docker_scout_compare.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_compare.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_compare.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_compare.yaml
diff --git a/data/scout-cli/docker_scout_config.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_config.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_config.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_config.yaml
diff --git a/data/scout-cli/docker_scout_cves.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_cves.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_cves.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_cves.yaml
diff --git a/data/scout-cli/docker_scout_enroll.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_enroll.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_enroll.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_enroll.yaml
diff --git a/data/scout-cli/docker_scout_environment.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_environment.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_environment.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_environment.yaml
diff --git a/data/scout-cli/docker_scout_help.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_help.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_help.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_help.yaml
diff --git a/data/scout-cli/docker_scout_integration.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_integration.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_integration.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_integration.yaml
diff --git a/data/scout-cli/docker_scout_integration_configure.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_integration_configure.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_integration_configure.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_integration_configure.yaml
diff --git a/data/scout-cli/docker_scout_integration_delete.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_integration_delete.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_integration_delete.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_integration_delete.yaml
diff --git a/data/scout-cli/docker_scout_integration_list.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_integration_list.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_integration_list.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_integration_list.yaml
diff --git a/data/scout-cli/docker_scout_policy.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_policy.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_policy.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_policy.yaml
diff --git a/data/scout-cli/docker_scout_push.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_push.yaml
similarity index 90%
rename from data/scout-cli/docker_scout_push.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_push.yaml
index 3c317532d1..4b1370ce08 100644
--- a/data/scout-cli/docker_scout_push.yaml
+++ b/_vendor/github.com/docker/scout-cli/docs/docker_scout_push.yaml
@@ -34,6 +34,15 @@ options:
experimentalcli: false
kubernetes: false
swarm: false
+ - option: platform
+ value_type: string
+ description: Platform of image to be pushed
+ deprecated: false
+ hidden: false
+ experimental: false
+ experimentalcli: false
+ kubernetes: false
+ swarm: false
- option: sbom
value_type: bool
default_value: "false"
diff --git a/data/scout-cli/docker_scout_quickview.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_quickview.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_quickview.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_quickview.yaml
diff --git a/data/scout-cli/docker_scout_recommendations.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_recommendations.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_recommendations.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_recommendations.yaml
diff --git a/data/scout-cli/docker_scout_repo.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_repo.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_repo.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_repo.yaml
diff --git a/data/scout-cli/docker_scout_repo_disable.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_repo_disable.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_repo_disable.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_repo_disable.yaml
diff --git a/data/scout-cli/docker_scout_repo_enable.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_repo_enable.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_repo_enable.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_repo_enable.yaml
diff --git a/data/scout-cli/docker_scout_repo_list.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_repo_list.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_repo_list.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_repo_list.yaml
diff --git a/data/scout-cli/docker_scout_sbom.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_sbom.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_sbom.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_sbom.yaml
diff --git a/data/scout-cli/docker_scout_stream.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_stream.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_stream.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_stream.yaml
diff --git a/data/scout-cli/docker_scout_version.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_version.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_version.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_version.yaml
diff --git a/data/scout-cli/docker_scout_watch.yaml b/_vendor/github.com/docker/scout-cli/docs/docker_scout_watch.yaml
similarity index 100%
rename from data/scout-cli/docker_scout_watch.yaml
rename to _vendor/github.com/docker/scout-cli/docs/docker_scout_watch.yaml
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout.md b/_vendor/github.com/docker/scout-cli/docs/scout.md
new file mode 100644
index 0000000000..c2f8f7b3a7
--- /dev/null
+++ b/_vendor/github.com/docker/scout-cli/docs/scout.md
@@ -0,0 +1,36 @@
+# docker scout
+
+```
+docker scout COMMAND
+```
+
+
+Command line tool for Docker Scout
+
+### Subcommands
+
+| Name | Description |
+|:----------------------------------------------|:--------------------------------------------------------------------------------------------|
+| [`attestation`](scout_attestation.md) | Manage attestations on image indexes |
+| [`cache`](scout_cache.md) | Manage Docker Scout cache and temporary files |
+| [`compare`](scout_compare.md) | Compare two images and display differences (experimental) |
+| [`config`](scout_config.md) | Manage Docker Scout configuration |
+| [`cves`](scout_cves.md) | Display CVEs identified in a software artifact |
+| [`enroll`](scout_enroll.md) | Enroll an organization with Docker Scout |
+| [`environment`](scout_environment.md) | Manage environments (experimental) |
+| [`help`](scout_help.md) | Display information about the available commands |
+| [`integration`](scout_integration.md) | Commands to list, configure, and delete Docker Scout integrations |
+| [`policy`](scout_policy.md) | Evaluate policies against an image and display the policy evaluation results (experimental) |
+| [`push`](scout_push.md) | Push an image or image index to Docker Scout (experimental) |
+| [`quickview`](scout_quickview.md) | Quick overview of an image |
+| [`recommendations`](scout_recommendations.md) | Display available base image updates and remediation recommendations |
+| [`repo`](scout_repo.md) | Commands to list, enable, and disable Docker Scout on repositories |
+| [`sbom`](scout_sbom.md) | Generate or display SBOM of an image |
+| [`stream`](scout_stream.md) | Manage streams (experimental) |
+| [`version`](scout_version.md) | Show Docker Scout version information |
+| [`watch`](scout_watch.md) | Watch repositories in a registry and push images and indexes to Docker Scout (experimental) |
+
+
+
+
+
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_attestation.md b/_vendor/github.com/docker/scout-cli/docs/scout_attestation.md
new file mode 100644
index 0000000000..d4f6bc5827
--- /dev/null
+++ b/_vendor/github.com/docker/scout-cli/docs/scout_attestation.md
@@ -0,0 +1,19 @@
+# docker scout attestation
+
+
+Manage attestations on image indexes
+
+### Aliases
+
+`docker scout attestation`, `docker scout attest`
+
+### Subcommands
+
+| Name | Description |
+|:----------------------------------|:-------------------------|
+| [`add`](scout_attestation_add.md) | Add attestation to image |
+
+
+
+
+
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_attestation_add.md b/_vendor/github.com/docker/scout-cli/docs/scout_attestation_add.md
new file mode 100644
index 0000000000..5f09c0fffd
--- /dev/null
+++ b/_vendor/github.com/docker/scout-cli/docs/scout_attestation_add.md
@@ -0,0 +1,19 @@
+# docker scout attestation add
+
+
+Add attestation to image
+
+### Aliases
+
+`docker scout attestation add`, `docker scout attest add`
+
+### Options
+
+| Name | Type | Default | Description |
+|:-------------------|:--------------|:--------|:----------------------------------------|
+| `--file` | `stringSlice` | | File location of attestations to attach |
+| `--predicate-type` | `string` | | Predicate-type for attestations |
+
+
+
+
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_cache.md b/_vendor/github.com/docker/scout-cli/docs/scout_cache.md
new file mode 100644
index 0000000000..9bb212dd3d
--- /dev/null
+++ b/_vendor/github.com/docker/scout-cli/docs/scout_cache.md
@@ -0,0 +1,16 @@
+# docker scout cache
+
+
+Manage Docker Scout cache and temporary files
+
+### Subcommands
+
+| Name | Description |
+|:--------------------------------|:--------------------------------|
+| [`df`](scout_cache_df.md) | Show Docker Scout disk usage |
+| [`prune`](scout_cache_prune.md) | Remove temporary or cached data |
+
+
+
+
+
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_cache_df.md b/_vendor/github.com/docker/scout-cli/docs/scout_cache_df.md
new file mode 100644
index 0000000000..71dcf99560
--- /dev/null
+++ b/_vendor/github.com/docker/scout-cli/docs/scout_cache_df.md
@@ -0,0 +1,52 @@
+# docker scout cache df
+
+
+Show Docker Scout disk usage
+
+
+
+
+## Description
+
+Docker Scout uses a temporary cache storage for generating image SBOMs.
+The cache helps avoid regenerating or fetching resources unnecessarily.
+
+This `docker scout cache df` command shows the cached data on the host.
+Each cache entry is identified by the digest of the image.
+
+You can use the `docker scout cache prune` command to delete cache data at any time.
+
+## Examples
+
+### List temporary and cache files
+
+```console
+$ docker scout cache df
+Docker Scout temporary directory to generate SBOMs is located at:
+ /var/folders/dw/d6h9w2sx6rv3lzwwgrnx7t5h0000gp/T/docker-scout
+ this path can be configured using the DOCKER_SCOUT_CACHE_DIR environment variable
+
+ Image Digest │ Size
+──────────────────────────────────────────────────────────────────────────┼────────
+ sha256:c41ab5c992deb4fe7e5da09f67a8804a46bd0592bfdf0b1847dde0e0889d2bff │ 21 kB
+
+Total: 21 kB
+
+
+Docker Scout cached SBOMs are located at:
+ /Users/user/.docker/scout/sbom
+
+ Image Digest │ Size of SBOM
+──────────────────────────────────────────────────────────────────────────┼───────────────
+ sha256:02bb6f428431fbc2809c5d1b41eab5a68350194fb508869a33cb1af4444c9b11 │ 42 kB
+ sha256:03fc002fe4f370463a8f04d3a288cdffa861e462fc8b5be44ab62b296ad95183 │ 100 kB
+ sha256:088134dd33e4a2997480a1488a41c11abebda465da5cf7f305a0ecf8ed494329 │ 194 kB
+ sha256:0b80b2f17aff7ee5bfb135c69d0d6fe34070e89042b7aac73d1abcc79cfe6759 │ 852 kB
+ sha256:0c9e8abe31a5f17d84d5c85d3853d2f948a4f126421e89e68753591f1b6fedc5 │ 930 kB
+ sha256:0d49cae0723c8d310e413736b5e91e0c59b605ade2546f6e6ef8f1f3ddc76066 │ 510 kB
+ sha256:0ef04748d071c2e631bb3edce8f805cb5512e746b682c83fdae6d8c0b243280b │ 1.0 MB
+ sha256:13fd22925b638bb7d2131914bb8f8b0f5f582bee364aec682d9e7fe722bb486a │ 42 kB
+ sha256:174c41d4fbc7f63e1f2bb7d2f7837318050406f2f27e5073a84a84f18b48b883 │ 115 kB
+
+Total: 4 MB
+```
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_cache_prune.md b/_vendor/github.com/docker/scout-cli/docs/scout_cache_prune.md
new file mode 100644
index 0000000000..7292884c7d
--- /dev/null
+++ b/_vendor/github.com/docker/scout-cli/docs/scout_cache_prune.md
@@ -0,0 +1,40 @@
+# docker scout cache prune
+
+
+Remove temporary or cached data
+
+### Options
+
+| Name | Type | Default | Description |
+|:----------------|:-----|:--------|:-------------------------------|
+| `-f`, `--force` | | | Do not prompt for confirmation |
+| `--sboms` | | | Prune cached SBOMs |
+
+
+
+
+## Description
+
+The `docker scout cache prune` command removes temporary data and SBOM cache.
+
+By default, `docker scout cache prune` only deletes temporary data.
+To delete temporary data and clear the SBOM cache, use the `--sboms` flag.
+
+## Examples
+
+### Delete temporary data
+
+```console
+$ docker scout cache prune
+? Are you sure to delete all temporary data? Yes
+ ✓ temporary data deleted
+```
+
+### Delete temporary _and_ cache data
+
+```console
+$ docker scout cache prune --sboms
+? Are you sure to delete all temporary data and all cached SBOMs? Yes
+ ✓ temporary data deleted
+ ✓ cached SBOMs deleted
+```
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_compare.md b/_vendor/github.com/docker/scout-cli/docs/scout_compare.md
new file mode 100644
index 0000000000..b3530da571
--- /dev/null
+++ b/_vendor/github.com/docker/scout-cli/docs/scout_compare.md
@@ -0,0 +1,108 @@
+# docker scout compare
+
+
+Compare two images and display differences (experimental)
+
+### Aliases
+
+`docker scout compare`, `docker scout diff`
+
+### Options
+
+| Name | Type | Default | Description |
+|:----------------------|:--------------|:--------|:-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| `-x`, `--exit-on` | `stringSlice` | | Comma separated list of conditions to fail the action step if worse, options are: vulnerability, policy |
+| `--format` | `string` | `text` | Output format of the generated vulnerability report:
- text: default output, plain text with or without colors depending on the terminal
- markdown: Markdown output
|
+| `--hide-policies` | | | Hide policy status from the output |
+| `--ignore-base` | | | Filter out CVEs introduced from base image |
+| `--ignore-unchanged` | | | Filter out unchanged packages |
+| `--multi-stage` | | | Show packages from multi-stage Docker builds |
+| `--only-fixed` | | | Filter to fixable CVEs |
+| `--only-package-type` | `stringSlice` | | Comma separated list of package types (like apk, deb, rpm, npm, pypi, golang, etc) |
+| `--only-severity` | `stringSlice` | | Comma separated list of severities (critical, high, medium, low, unspecified) to filter CVEs by |
+| `--only-stage` | `stringSlice` | | Comma separated list of multi-stage Docker build stage names |
+| `--only-unfixed` | | | Filter to unfixed CVEs |
+| `--org` | `string` | | Namespace of the Docker organization |
+| `-o`, `--output` | `string` | | Write the report to a file |
+| `--platform` | `string` | | Platform of image to analyze |
+| `--ref` | `string` | | Reference to use if the provided tarball contains multiple references.
Can only be used with archive |
+| `--to` | `string` | | Image, directory, or archive to compare to |
+| `--to-env` | `string` | | Name of environment to compare to |
+| `--to-latest` | | | Latest image processed to compare to |
+| `--to-ref` | `string` | | Reference to use if the provided tarball contains multiple references.
Can only be used with archive. |
+
+
+
+
+## Description
+
+The `docker scout compare` command analyzes two images and displays a comparison.
+
+> This command is **experimental** and its behaviour might change in the future
+
+The intended use of this command is to compare two versions of the same image.
+For instance, when a new image is built and compared to the version running in production.
+
+If no image is specified, the most recently built image is used
+as a comparison target.
+
+The following artifact types are supported:
+
+- Images
+- OCI layout directories
+- Tarball archives, as created by `docker save`
+- Local directory or file
+
+By default, the tool expects an image reference, such as:
+
+- `redis`
+- `curlimages/curl:7.87.0`
+- `mcr.microsoft.com/dotnet/runtime:7.0`
+
+If the artifact you want to analyze is an OCI directory, a tarball archive, a local file or directory,
+or if you want to control from where the image will be resolved, you must prefix the reference with one of the following:
+
+- `image://` (default) use a local image, or fall back to a registry lookup
+- `local://` use an image from the local image store (don't do a registry lookup)
+- `registry://` use an image from a registry (don't use a local image)
+- `oci-dir://` use an OCI layout directory
+- `archive://` use a tarball archive, as created by `docker save`
+- `fs://` use a local directory or file
+
+## Examples
+
+### Compare the most recently built image to the latest tag
+
+```console
+$ docker scout compare --to namespace/repo:latest
+```
+
+### Compare local build to the same tag from the registry
+
+```console
+$ docker scout compare local://namespace/repo:latest --to registry://namespace/repo:latest
+```
+
+### Ignore base images
+
+```console
+$ docker scout compare --ignore-base --to namespace/repo:latest namespace/repo:v1.2.3-pre
+```
+
+### Generate a markdown output
+
+```console
+$ docker scout compare --format markdown --to namespace/repo:latest namespace/repo:v1.2.3-pre
+```
+
+### Only compare maven packages and only display critical vulnerabilities for maven packages
+
+```console
+$ docker scout compare --only-package-type maven --only-severity critical --to namespace/repo:latest namespace/repo:v1.2.3-pre
+```
+
+### Show all policy results for both images
+
+```console
+docker scout compare --to namespace/repo:latest namespace/repo:v1.2.3-pre
+```
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_config.md b/_vendor/github.com/docker/scout-cli/docs/scout_config.md
new file mode 100644
index 0000000000..1a6e8b69c9
--- /dev/null
+++ b/_vendor/github.com/docker/scout-cli/docs/scout_config.md
@@ -0,0 +1,38 @@
+# docker scout config
+
+
+Manage Docker Scout configuration
+
+
+
+
+## Description
+
+`docker scout config` allows you to list, get and set Docker Scout configuration.
+
+Available configuration key:
+
+- `organization`: Namespace of the Docker organization to be used by default.
+
+## Examples
+
+### List existing configuration
+
+```console
+$ docker scout config
+organization=my-org-namespace
+```
+
+### Print configuration value
+
+```console
+$ docker scout config organization
+my-org-namespace
+```
+
+### Set configuration value
+
+```console
+$ docker scout config organization my-org-namespace
+ ✓ Successfully set organization to my-org-namespace
+```
diff --git a/_vendor/github.com/docker/scout-cli/docs/scout_cves.md b/_vendor/github.com/docker/scout-cli/docs/scout_cves.md
new file mode 100644
index 0000000000..b8f119d8a9
--- /dev/null
+++ b/_vendor/github.com/docker/scout-cli/docs/scout_cves.md
@@ -0,0 +1,268 @@
+# docker scout cves
+
+```
+docker scout cves [OPTIONS] [IMAGE|DIRECTORY|ARCHIVE]
+```
+
+
+Display CVEs identified in a software artifact
+
+### Options
+
+| Name | Type | Default | Description |
+|:-----------------------|:--------------|:-----------|:----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
+| `--details` | | | Print details on default text output |
+| `--env` | `string` | | Name of environment |
+| [`--epss`](#epss) | | | Display the EPSS scores and organize the package's CVEs according to their EPSS score |
+| `--epss-percentile` | `float32` | `0` | Exclude CVEs with EPSS scores less than the specified percentile (0 to 1) |
+| `--epss-score` | `float32` | `0` | Exclude CVEs with EPSS scores less than the specified value (0 to 1) |
+| `-e`, `--exit-code` | | | Return exit code '2' if vulnerabilities are detected |
+| `--format` | `string` | `packages` | Output format of the generated vulnerability report:
- packages: default output, plain text with vulnerabilities grouped by packages
- sarif: json Sarif output
- spdx: json SPDX output
- markdown: markdown output (including some html tags like collapsible sections)
- sbom: json SBOM output
|
+| `--ignore-base` | | | Filter out CVEs introduced from base image |
+| `--locations` | | | Print package locations including file paths and layer diff_id |
+| `--multi-stage` | | | Show packages from multi-stage Docker builds |
+| `--only-cve-id` | `stringSlice` | | Comma separated list of CVE ids (like CVE-2021-45105) to search for |
+| `--only-fixed` | | | Filter to fixable CVEs |
+| `--only-metric` | `stringSlice` | | Comma separated list of CVSS metrics (like AV:N or PR:L) to filter CVEs by |
+| `--only-package` | `stringSlice` | | Comma separated regular expressions to filter packages by |
+| `--only-package-type` | `stringSlice` | | Comma separated list of package types (like apk, deb, rpm, npm, pypi, golang, etc) |
+| `--only-severity` | `stringSlice` | | Comma separated list of severities (critical, high, medium, low, unspecified) to filter CVEs by |
+| `--only-stage` | `stringSlice` | | Comma separated list of multi-stage Docker build stage names |
+| `--only-unfixed` | | | Filter to unfixed CVEs |
+| `--only-vex-affected` | | | Filter CVEs by VEX statements with status not affected |
+| `--only-vuln-packages` | | | When used with --format=only-packages ignore packages with no vulnerabilities |
+| `--org` | `string` | | Namespace of the Docker organization |
+| `-o`, `--output` | `string` | | Write the report to a file |
+| `--platform` | `string` | | Platform of image to analyze |
+| `--ref` | `string` | | Reference to use if the provided tarball contains multiple references.
Can only be used with archive |
+| `--vex-author` | `stringSlice` | | List of VEX statement authors to accept |
+| `--vex-location` | `stringSlice` | | File location of directory or file containing VEX statements |
+
+
+
+
+## Description
+
+The `docker scout cves` command analyzes a software artifact for vulnerabilities.
+
+If no image is specified, the most recently built image is used.
+
+The following artifact types are supported:
+
+- Images
+- OCI layout directories
+- Tarball archives, as created by `docker save`
+- Local directory or file
+
+By default, the tool expects an image reference, such as:
+
+- `redis`
+- `curlimages/curl:7.87.0`
+- `mcr.microsoft.com/dotnet/runtime:7.0`
+
+If the artifact you want to analyze is an OCI directory, a tarball archive, a local file or directory,
+or if you want to control from where the image will be resolved, you must prefix the reference with one of the following:
+
+- `image://` (default) use a local image, or fall back to a registry lookup
+- `local://` use an image from the local image store (don't do a registry lookup)
+- `registry://` use an image from a registry (don't use a local image)
+- `oci-dir://` use an OCI layout directory
+- `archive://` use a tarball archive, as created by `docker save`
+- `fs://` use a local directory or file
+- `sbom://` SPDX file or in-toto attestation file with SPDX predicate or `syft` json SBOM file
+ In case of `sbom://` prefix, if the file is not defined then it will try to read it from the standard input.
+
+## Examples
+
+### Display vulnerabilities grouped by package
+
+```console
+$ docker scout cves alpine
+Analyzing image alpine
+✓ Image stored for indexing
+✓ Indexed 18 packages
+✓ No vulnerable package detected
+```
+
+### Display vulnerabilities from a `docker save` tarball
+
+```console
+$ docker save alpine > alpine.tar
+
+$ docker scout cves archive://alpine.tar
+Analyzing archive alpine.tar
+✓ Archive read
+✓ SBOM of image already cached, 18 packages indexed
+✓ No vulnerable package detected
+```
+
+### Display vulnerabilities from an OCI directory
+
+```console
+$ skopeo copy --override-os linux docker://alpine oci:alpine
+
+$ docker scout cves oci-dir://alpine
+Analyzing OCI directory alpine
+✓ OCI directory read
+✓ Image stored for indexing
+✓ Indexed 19 packages
+✓ No vulnerable package detected
+```
+
+### Display vulnerabilities from the current directory
+
+```console
+$ docker scout cves fs://.
+```
+
+### Export vulnerabilities to a SARIF JSON file
+
+```console
+$ docker scout cves --format sarif --output alpine.sarif.json alpine
+Analyzing image alpine
+✓ SBOM of image already cached, 18 packages indexed
+✓ No vulnerable package detected
+✓ Report written to alpine.sarif.json
+```
+
+### Display markdown output
+
+The following example shows how to generate the vulnerability report as markdown.
+
+```console
+$ docker scout cves --format markdown alpine
+✓ Pulled
+✓ SBOM of image already cached, 19 packages indexed
+✗ Detected 1 vulnerable package with 3 vulnerabilities
+
alpine
alpine
digest | sha256:e3bd82196e98898cae9fe7fbfd6e2436530485974dc4fb3b7ddb69134eda2407 |
vulnerabilities | |
platform | linux/arm64 |
size | 3.3 MB |
packages | 19 |