Chapter 1. Overview of Red Hat Advanced Developer Suite - software supply chain standalone CLI programs


You can use five command line interface (CLI) programs as part of Red Hat Advanced Developer Suite - software supply chain (RHADS - SSC) to enhance the security and compliance in your software supply chain.

These standalone CLI programs are shipped with Red Hat products that are either components or dependencies of RHADS - SSC:

To check that a CLI binary is available for your architecture, view Chapter 2. Architectures

1.1. CLI programs available with RHTAS

The binaries of the Cosign, Rekor, and Conforma CLI programs are shipped as components of RHTAS. After you have installed RHTAS, you can download these binaries from the OpenShift cluster by using the OpenShift web console.

Cosign

cosign is a tool for signing container images and verifying the signatures.

Rekor

The rekor tool is a data log that stores metadata of signed software artifacts and provides transparency for signatures of those artifacts. With the Rekor CLI, you can make, verify, and query entries in the Rekor transparency log.

Conforma

Conforma is a tool that enhances security of software supply chains. You can use it to define and enforce security policies for building and testing container images. Conforma is the Red Hat-supported build of the upstream open source project Conforma.

1.2. CLI used with RHTPA

Syft

Syft is a CLI tool for generating Software Bill of Materials (SBOMs) for container images or your local file systems. It provides detailed information about packages, libraries, and dependencies of your software or file systems. Transparency on the software composition helps you secure your software supply chain and manage vulnerabilities.

Syft is distributed as a standalone container image through Red Hat Ecosystem Catalog. The container image is available for AMD64 architecture on Linux.

1.3. CLI used with RHACS

roxctl

roxctl is a CLI for running commands on RHACS. RHADS - SSC pipelines can run three roxctl tasks, including scanning your container images for vulnerabilities and checking the build-time violations of your security policies in container images and YAML deployment files.

Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2026 Red Hat
Back to top