inspect-image¶
Explore the contents of a container image.
Description¶
The inspect-image prompt provides instructions for thoroughly examining a container image to understand its contents, installed software, and configuration.
Parameters¶
Parameter |
Type |
Required |
Default |
Description |
|---|---|---|---|---|
|
string |
Yes |
- |
Image UUID or tag to inspect |
Generated Instructions¶
When invoked with:
{
"image": "tag:python:3.11-slim"
}
Returns:
Inspect the container image `tag:python:3.11-slim`:
1. Use `run` with the image to explore:
- `ls -la /` - List root directory contents
- `cat /etc/os-release` - Check OS version
- `which python pip node` - Find installed tools
- `pip list` or `dpkg -l` - List installed packages
2. Report findings:
- Operating system and version
- Available languages/runtimes
- Key installed packages
- Notable files or directories
3. Use `disposable=true` (default) since we're just exploring
Example Usage¶
Explore Python Image¶
{
"prompt": "inspect-image",
"args": {
"image": "tag:python:3.11-slim"
}
}
Explore Custom Image¶
{
"prompt": "inspect-image",
"args": {
"image": "abc123-def456-uuid"
}
}
Explore Alpine¶
{
"prompt": "inspect-image",
"args": {
"image": "tag:alpine:latest"
}
}
Implementation Notes¶
The agent should use the free inspection tools first, then run for dynamic queries:
Use
list_filesfirst (free, no VM):{"image": "<image>", "path": "/"} {"image": "<image>", "path": "/etc"} {"image": "<image>", "path": "/usr/local/bin"}
Use
read_filefor config files (free, no VM):{"image": "<image>", "path": "/etc/os-release"}
Use
runfor dynamic queries (spawns VM):{"command": "pip list", "image": "<image>"} {"command": "which python pip node", "image": "<image>"}
Report findings in a structured format:
OS: Debian 12 / Alpine 3.18 / etc.
Languages: Python 3.11, Node.js 20, etc.
Key packages: numpy, flask, etc.
Notable directories: /app, /data, etc.
See Also¶
list_files - List directory contents (free)
read_file - Read file contents (free)
debug-failure - Debug after inspection