Using CVE Visualizations
Getting started with the CVE Visualization feature.
This guide serves as a walkthrough of the Chainguard Console, which is accessible to anyone, but you’ll first need to create an account and log in.
If you’re not ready to create a Chainguard account, you can follow along with the public Chainguard Directory which offers similar information, but is only informative as it is not connected to your organization or account. If you use the Sign In link in the directory, it brings you to the console.
Log in to access the Chainguard Console.
If you would like to open the console with your Organization already selected, you can use (and bookmark) a link like this, replacing ORGANIZATION with your organization’s name:
https://console.chainguard.dev/auth/login?org=ORGANIZATIONAfter signing in to the Chainguard Console, your browser will take you to the Overview page. The following screenshot shows the Overview Page for an organization that hasn’t paid for access to any container images:

If your organization and account have Chainguard Notifications enabled, you will see a box like this on the page where notifications from Chainguard will occasionally be shown.

Click Images in the left-hand navigation. By default, takes you to the Organization images tab. If you’re part of an organization, you may have access to private Chainguard Containers (or Production Containers) that can be found here.
Navigate to the Chainguard catalog tab. There, you’ll be presented with a list of all of Chainguard’s available images:

The Chainguard catalog tab has a table with four columns:
Note that if your organization has signed up for catalog pricing, there will be another column containing buttons labeled Add to org, allowing you to provision Chainguard Containers independently without having to reach out to Chainguard. Check out our doc on Chainguard Container Catalog Pricing for more information.
The Organization tab doesn’t have a Description column, but has two additional columns. The first of these, labeled Status specifies what resources an organization has purchased and has access to. This column can show one of two possible values: Active, meaning that your organization is able to download and use the container image, or Expired, meaning that your organization had access to the container image in the past but not anymore:

The other additional column is labeled Pull URL, and contains a URL you can use to pull the given image, as in a docker pull command.
You can click on any of these column names to sort the list of container images in ascending or descending order based on the values in these columns.
Above the table is a search box you can use to find specific container images by their name or latest version number. To the right of this box is a drop-down menu labeled Category. You can use this to filter the images listed based on which of Chainguard’s Container Image categories they belong to.
Next, let’s inspect an individual container image. Click on any container image you’d like:

This example shows the details page for argocd in the Console.
Each container image details page has several tabs that provide information about various facets of the given image.
The default page for each image is the Tags tab which contains information about the version tags available for each image. This contains a table with columns:
Add to organization for access if you’re logged in under an organization with access to Production Containers; if you’re logged in under an unverified organization, the message reads Request image for access.Above the table is a search box which you can use to filter the different versions available for the image. There is also a Variant drop-down menu you can use to filter for all images, only development variants, or only non-development variants.
The Overview tab contains the container image’s README. Typically, READMEs include instructions on how to download the container image, any relevant compatibility notes, and instructions on how to get started with using the image.
The Comparisons tab includes useful data that shows how a given Chainguard Container compares against a non-Chainguard alternative in terms of CVE count. It also includes helpful visualizations of these comparisons. For more information, check out our guide on CVE Visualizations.
All Chainguard Containers contain verifiable signatures and high-quality software bills of materials (SBOMs). These features allow you to confirm the origin of each image and provide you with a detailed list of everything included in the container image.
The Provenance tab outlines how you can verify container signatures and download and verify container image attestations, all with examples using cosign.
The Specifications tab is where you can find a number of important details about a given container image, such as whether it ships with the apk package manager or a shell. It also includes information like the image’s default user ID, environment variables, and its entrypoint.
It also shows the container image’s Raw configuration, which includes many of these details as well as its OCI labels (similar to annotations).

The SBOM tab contains a list of packages in the image. Chainguard Containers are built so that everything contained in the image is a package, meaning that this package list gives a complete view of what’s in the container image. You won’t find anything hidden in the image that isn’t listed in its SBOM tab.

The table listing an image’s packages has four columns.
Above the table is a search box you can use to find and filter the packages listed. To the left of this search box is a drop-down menu you can use to select which version of the image you want to find the SBOM for as well as what architecture (either x86_64 or arm64).
Finally, to the right of the search box is a button labeled Download SBOM. If the image is a Free Container or a container image your organization has access to, you can click this button to download the SBOM (in the SPDX format) to your machine.
Note that Chainguard began generating SBOMs for its images on November 15, 2023. For this reason, any versions of a given container image that were released before that date will not have any SBOM data to show.
The Vulnerabilities tab contains a list of every CVE one can find within the image. As with the SBOMs tab, the Vulnerabilities tab has a search box you can use to find and filter specific vulnerabilities within the image. There is also a drop-down menu to the left allowing you to select different versions of the container image.
Below these is a table listing the vulnerabilities. However, most Chainguard Containers won’t show any vulnerabilities for the latest version. This isn’t an error, as we aim to remove vulnerabilities from images as soon as they arise.
To illustrate how this table appears when vulnerabilities are actually present, you can select different versions in the drop-down until you find one with a vulnerability. This example shows the vulnerabilities in version 3.1.7 of the argocd image.

The Vulnerabilities table has five columns.
To the left of each row in the table is down-pointing chevron (˅). Clicking on this expands the row to show more information about the given vulnerability.

Specifically, this highlights the Package name and Version number of the package associated with the vulnerability. It also shows the Fixed version of the package, a brief Description of the vulnerability, and one or more References you can review to learn more about the vulnerability.
Please be aware that, as with SBOM data, Chainguard began generating vulnerability information for its images on November 15, 2023. For this reason, any versions of a given image that were released before that date won’t have any vulnerability data to show.
The Advisories tab lists any CVEs that have affected the image in the past and what action Chainguard took to remediate the CVE. This tab shows a timeline of each security advisory released for a given container image, starting with the most recent. Each entry specifies the date and time the advisory was released, the CVE in question, the affected package, and the current status.
To learn more about Chainguard security advisories, we encourage you to read our article on How Chainguard Issues Security Advisories as well as our guide on How to Use Chainguard Security Advisories. You an also find every security advisory published for Chainguard Containers by exploring our self-service Security Advisories page.
Chainguard Containers viewed in the Console have an additional Builds tab. However, this tab is only accessible if the container image in question has been customized with Chainguard’s Custom Assembly tool.
Our guide on Using the Chainguard Console to Manage Custom Assembly Resources provides an in-depth overview of the Builds tab, as well as working with Custom Assembly in the Chainguard Console.
The Chainguard Console is a useful tool for understanding what Chainguard container images are available and learn details about each. To better understand how to work with individual container images, you can see if we have a getting started guide available. We also provide a guide on how to view security advisories through our self-service public Security Advisories page.
Last updated: 2025-10-23 11:07