HiveBrain v1.2.0
Get Started
← Back to all entries
snippetbashTip

vet — Scan package manifests, directories, container images, or GitHub repositories to identify vulnerabil

Submitted by: @import:tldr-pages··
0
Viewed 0 times
commandmanifestsclidirectoriesvetpackagescancontainer

Problem

How to use the vet command: Scan package manifests, directories, container images, or GitHub repositories to identify vulnerabilities, malicious packages, and enforce security policies using CEL expressions. More information: <https://safedep.github.io/vet/vet.html>.

Solution

vet — Scan package manifests, directories, container images, or GitHub repositories to identify vulnerabilities, malicious packages, and enforce security policies using CEL expressions. More information: <https://safedep.github.io/vet/vet.html>.

Scan the current directory:
vet scan {{[-D|--directory]}} .


Scan the package-lock.json manifest file:
vet scan {{[-M|--manifests]}} {{path/to/manifest_file}}


Scan with filter to fail on any critical vulnerability found in the codebase:
vet scan {{[-D|--directory]}} {{path/to/directory}} --filter 'vulns.critical.exists(p, true)' --filter-fail


Scan any OSS package for malware:
vet inspect malware --purl {{package_url}}


Start the MCP server for AI enabled security in code editors like Cursor:
vet server mcp

Code Snippets

Scan the current directory

vet scan {{[-D|--directory]}} .

Scan the `package-lock.json` manifest file

vet scan {{[-M|--manifests]}} {{path/to/manifest_file}}

Scan with filter to fail on any critical vulnerability found in the codebase

vet scan {{[-D|--directory]}} {{path/to/directory}} --filter 'vulns.critical.exists(p, true)' --filter-fail

Scan any OSS package for malware

vet inspect malware --purl {{package_url}}

Start the MCP server for AI enabled security in code editors like Cursor

vet server mcp

Context

tldr-pages: common/vet

Revisions (0)

No revisions yet.