We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 4d9777c commit 80e6c59Copy full SHA for 80e6c59
README.md
@@ -102,7 +102,7 @@ Values should follow
102
103
To run the analysis code locally, the easiest way is to use the Docker image
104
`gcr.io/ossf-malware-analysis/analysis`. This can be built with
105
-`make build_analysis_image`, or the public images can be used instead.
+`make build/image/analysis`, or the public images can be used instead.
106
107
This container uses `podman` to run a nested, sandboxed ([gVisor]) container for
108
analysis.
0 commit comments