Skip to content

Connecting Registries

Connect a registry to discover existing images, scan them, and watch for new vulnerabilities over time. Each registry uses provider-native authentication; only Harbor supports webhook-driven real-time scanning today, the others use a nightly rescan job.

  1. Open Settings → Registries and click Add Registry.
  2. Pick the provider (Docker Hub, ECR, GCR, or Harbor).
  3. Provide credentials (see provider tabs below).
  4. Click Test connection — Vygl verifies the credentials and lists the repositories it can see.
  5. Pick repositories to enable. Each becomes a Vygl project automatically.
Docker Hub
FieldValue
UsernameYour Docker Hub username
PasswordPersonal access token (recommended) or password

Docker Hub has strict anonymous-pull rate limits — always provide credentials, even for public images you “could” pull anonymously.

Webhook support: No. Images are scanned on the nightly rescan job (03:00 UTC).

RegistryReal-timeNightly rescan
Docker Hub03:00 UTC
AWS ECR03:00 UTC
Google GCR03:00 UTC
HarborWebhook on push03:00 UTC (catch-up)

The nightly rescan picks up the latest tag for each enabled repository (or all tags matching a tag_filter_regex). It also re-evaluates existing scans against the latest OSV data — so a CVE disclosed today appears on tomorrow’s scan even if the image hasn’t changed.

Each repository can specify a tag filter regex (for example ^v\d+\.\d+\.\d+$ to scan only semver tags). Without a filter, every tag is scanned.