From f7d0027fb3ea2d588dd7631fae3cd01aedece862 Mon Sep 17 00:00:00 2001 From: Niels Kaspers Date: Tue, 21 Apr 2026 10:04:07 +0300 Subject: [PATCH] docs(scout): standardize CLI command to `docker scout` in CI guides (#24843) Signed-off-by: Niels Kaspers --- content/manuals/scout/integrations/ci/circle-ci.md | 2 +- content/manuals/scout/integrations/ci/jenkins.md | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/content/manuals/scout/integrations/ci/circle-ci.md b/content/manuals/scout/integrations/ci/circle-ci.md index 81123abe37da..ae8cbc2f2496 100644 --- a/content/manuals/scout/integrations/ci/circle-ci.md +++ b/content/manuals/scout/integrations/ci/circle-ci.md @@ -55,7 +55,7 @@ steps: - run: name: Scan image for CVEs command: | - docker-scout cves $IMAGE_TAG --exit-code --only-severity critical,high + docker scout cves $IMAGE_TAG --exit-code --only-severity critical,high ``` This checks out the repository files and then sets up a separate Docker diff --git a/content/manuals/scout/integrations/ci/jenkins.md b/content/manuals/scout/integrations/ci/jenkins.md index ed836c197680..be88742b3b1c 100644 --- a/content/manuals/scout/integrations/ci/jenkins.md +++ b/content/manuals/scout/integrations/ci/jenkins.md @@ -31,7 +31,7 @@ pipeline { sh 'echo $DOCKER_HUB_PSW | docker login -u $DOCKER_HUB_USR --password-stdin' // Analyze and fail on critical or high vulnerabilities - sh 'docker-scout cves $IMAGE_TAG --exit-code --only-severity critical,high' + sh 'docker scout cves $IMAGE_TAG --exit-code --only-severity critical,high' } } }