How to document/communicate seccomp requirements

I am curious if there are examples out on Docker Hub of images that make syscalls that are not allowed by the default seccomp profile. How are people documenting/communicating with consumers what syscalls are required in order to run? Are people providing profiles that can be used to run the container?