Process Flow - Scanning images for vulnerabilities
Start: Docker Image Ready
Run Vulnerability Scan Command
Scan Tool Analyzes Image Layers
Scan Tool Checks Known Vulnerabilities Database
Report Vulnerabilities Found
User Reviews Report and Takes Action
End
The flow shows scanning a Docker image by running a scan tool that checks image layers against a vulnerability database and reports findings for user review.