@@ -119,6 +119,38 @@ $ docker scout attest get docs/dhi-node:20.19-debian12-fips-20250701182639 \
119119 --predicate-type https://scout.docker.com/sbom/v0.1 --verify
120120```
121121
122+ #### Handle missing transparency log entries
123+
124+ When using ` --verify ` , you may sometimes see an error like:
125+
126+ ``` text
127+ ERROR no matching signatures: signature not found in transparency log
128+ ```
129+
130+ This occurs because Docker Hardened Images don't always record attestations in
131+ the public [ Rekor] ( https://docs.sigstore.dev/logging/overview/ ) transparency
132+ log. In cases where an attestation would contain private user information (for
133+ example, your organization's namespace in the image reference), writing it to
134+ Rekor would expose that information publicly.
135+
136+ Even if the Rekor entry is missing, the attestation is still signed with
137+ Docker's public key and can be verified offline by skipping the Rekor
138+ transparency log check.
139+
140+ To skip the transparency log check and validate against Docker's key, use the
141+ ` --skip-tlog ` flag:
142+
143+ ``` console
144+ $ docker scout attest get \
145+ --predicate-type https://cyclonedx.org/bom/v1.6 \
146+ <your-org-namespace>/dhi-<image>:<tag> --platform <platform> \
147+ --verify --skip-tlog
148+ ```
149+
150+ This is equivalent to using ` cosign ` with the ` --insecure-ignore-tlog=true `
151+ flag, which validates the signature against Docker's published public key, but
152+ ignores the transparency log check.
153+
122154### Show the equivalent cosign command
123155
124156When using the ` --verify ` flag, it also prints the corresponding
0 commit comments