<?xml version="1.0" encoding="UTF-8"?><oembed><type>video</type><version>1.0</version><html>&lt;iframe src=&quot;https://www.loom.com/embed/e066986569924555a2546139f5f61349&quot; frameborder=&quot;0&quot; width=&quot;1110&quot; height=&quot;832&quot; webkitallowfullscreen mozallowfullscreen allowfullscreen&gt;&lt;/iframe&gt;</html><height>832</height><width>1110</width><provider_name>Loom</provider_name><provider_url>https://www.loom.com</provider_url><thumbnail_height>832</thumbnail_height><thumbnail_width>1110</thumbnail_width><thumbnail_url>https://cdn.loom.com/sessions/thumbnails/e066986569924555a2546139f5f61349-00001.gif</thumbnail_url><duration>286.30000000000007</duration><title>Using Docker Scout to Remediate Vulnerabilities 🛡️</title><description>Hi, I&apos;m Christian from the Docker Scout Product Development Team. In this Loom, I&apos;ll show you how to use Docker Scout to quickly discover and remediate vulnerabilities and containerize applications. I&apos;ll use our sample repository on GitHub to demonstrate how Docker Scout can help you investigate and fix CVEs. As a developer, I&apos;ll show you how to use Docker Scout&apos;s image analysis view to drill into the composition of your Docker image and investigate which vulnerabilities exist. I&apos;ll also show you how to use Docker Scout&apos;s recommendation engine to fix vulnerabilities in your base image. Finally, I&apos;ll demonstrate how you can compare your local work against what&apos;s currently running in production using Docker Scout. By the end of this Loom, you&apos;ll know how to use Docker Scout to eliminate all vulnerabilities in your Docker image.</description></oembed>