Action Required: Map Container Images to Source Code
Why You’re Seeing “Action Required”
If you’re seeing Action Required on an image vulnerability, it means: Backline detected a vulnerability in a container image, but cannot yet determine where that image is built in your codebase. To safely remediate image vulnerabilities, Backline needs build context:- Which repository builds the image
- Which Dockerfile produces it
When Backline Maps Images Automatically
In many cases, you won’t need to do anything. If an image includes explicit build metadata — such as repository or Dockerfile references embedded in tags or labels — Backline can automatically assign the image to code. For example, Backline may automatically map when:- Image tags include repository identifiers
- Image labels reference build source or Dockerfile location
- Build pipelines embed source metadata into the image
What Happens After You Complete This Action
When you assign the image to its repository and Dockerfile: ✅ All vulnerabilities from that image are updated✅ Vulnerabilities move into remediation workflows
✅ Backline can begin fix analysis and remediation planning
✅ Future scans of the same image automatically inherit the mapping
This removes one of the most common blockers between detection and remediation for container security.
Why Backline Requires This Mapping
Security scanners detect vulnerabilities in images.Remediation happens in code. Without knowing where an image is built, Backline cannot safely:
- Identify the correct dependency to upgrade
- Open remediation pull requests
- Validate fixes against the correct build pipeline
When This Is Required
Backline will request mapping only when:- An image vulnerability is detected
- Repository or Dockerfile information is missing
- Backline cannot determine mapping automatically
- Remediation cannot proceed safely without build context
Pending Action.
How Image → Code Mapping Works
Backline Attempts Automatic Mapping
During image scan ingestion, Backline attempts to detect mapping from:
- Image tags
- Image labels
- Embedded build metadata
Backline Notifies You (Only If Needed)
You will see:
- Action Required button on the vulnerability card
- Optional Slack reminders (if Slack integration is enabled)
You Assign Image → Code
You select:
- Repository
- Dockerfile
What Backline Updates Automatically
When mapping is saved, Backline: ✅ Sets repository and Dockerfile for all matching vulnerabilities✅ Applies mapping across the entire image digest
✅ Moves eligible vulnerabilities into the remediation pipeline
User Experience Walkthrough
Vulnerability Card
When mapping is required, you will see: Action RequiredSelect the repository and Dockerfile that build this image to enable remediation. Clicking opens the mapping workflow.
Assign Image to Code Workflow
Select Repository
- Searchable list of connected repositories
- Shows full repo name (for example:
org/service-api)
Save Confirmation
Backline confirms mapping and shows how many vulnerabilities were updated.Slack Notifications
If Slack integration is enabled, Backline can send reminders when action is required. Example Slack notification:🔔 Action required: Pending actions are waiting for you in Backline
👉 Review now
👉 Review now
Related Documentation
Vulnerabilities Overview
Learn about the vulnerability dashboard and filtering
Remediations
Understand how remediations work in Backline
Slack Integration
Set up Slack notifications for your team
Container Registries
Connect your container registries to Backline