Scan container images from GitHub container registry in Snyk
Snyk tests and monitors your GitHub container images by evaluating their tags in your repositories. Once imported to Snyk, your image vulnerabilities are surfaced and can be triaged efficiently.
To add images from the GitHub container registry to Snyk:
Prerequisites:
- Have a Snyk account with access to the relevant organization (given by an administrator).
- GitHub container registry integration configured. To learn more about that, follow the steps in Container security with GitHub container registry integration.
Steps:
- 1.Log in to your account and navigate to the relevant group and organization you want to manage.
- 2.Under the Projects tab, click Add project. The list of integrations already configured on your account opens. Select the GitHub container registry option or Other if the GitHub container registry doesn’t appear.
- 3.The Which images do you want to test? view appears, displaying all available images for your connected registry, grouped by each of your repositories. Note: GitHub Container Registry doesn't follow docker v2 API. Therefore, it is not possible to list images in repos. Due to that, you will need to specify the images you wish to scan manually.
- 4.Select single or multiple images to be imported to Snyk. Selection can be made by choosing a specific image or an entire repository. You can also search by image name to find specific images to import. To finish, click Add selected repositories on the top-right.
- 5.A status bar appears at the top of the page as the images are imported; you can continue working in the meantime.
- 6.When the import ends:
- You can view the newly imported image on the Projects page (marked with a NEW tag). Images are grouped by repository and are each linked individually to a detailed Project page.
- An import log becomes available and can be reached at the top of the projects list.
- To enrich the data and get recommendations regarding your base image, you can connect your Dockerfile to the image project under Settings. For more info, see Adding your Dockerfile and test your base image.
GitHub container registry imports are indicated with a unique icon, and you can also filter the integration in the projects view to see GitHub container registry projects only:

For application vulnerabilities within container images, any changes to the application will not be reflected with a manual or recurring retest. A re-import of the image is required. See Detecting application vulnerabilities in container images for more information.