Skip to content

Syft

Version: 1.0.0 | Tests: Passing

devcontainer.json
{
    "features": {
        "ghcr.io/infrashift/trusted-devcontainer-features/syft:latest": {
            "target_version": "1.42.0"
        }
    }
}
OptionTypeDefaultDescription
target_versionstring1.42.0Select a supported Syft binary version
target_checksumstring""SHA256 checksum for the Syft binary

None — this feature is independent and has no dependencies.

This feature downloads the Syft SBOM generator from Anchore’s GitHub releases. The Ansible playbook downloads the syft_<version>_linux_amd64.tar.gz tarball for the specified version and optionally verifies the SHA256 checksum. If no checksum is provided via the target_checksum option, the playbook downloads the checksums file from the release to perform verification. Once verified, the binary is extracted to ~/.local/bin.

After installation, the playbook verifies that Syft is working correctly by running syft version to confirm the installed version. Syft has no external dependencies, so this feature installs cleanly without a dependency chain.

Syft generates Software Bills of Materials (SBOMs) in CycloneDX, SPDX, and other standard formats from container images, filesystems, and archives. SBOMs are increasingly required for software supply chain security compliance, and having Syft available in your devcontainer allows you to generate and inspect SBOMs as part of your development workflow. Syft pairs well with the Grype feature, which uses Syft-generated SBOMs to scan for known vulnerabilities.