snippetbashTip
vet — Scan package manifests, directories, container images, or GitHub repositories to identify vulnerabil
Viewed 0 times
commandmanifestsclidirectoriesvetpackagescancontainer
Problem
How to use the
vet command: Scan package manifests, directories, container images, or GitHub repositories to identify vulnerabilities, malicious packages, and enforce security policies using CEL expressions. More information: <https://safedep.github.io/vet/vet.html>.Solution
vet — Scan package manifests, directories, container images, or GitHub repositories to identify vulnerabilities, malicious packages, and enforce security policies using CEL expressions. More information: <https://safedep.github.io/vet/vet.html>.Scan the current directory:
vet scan {{[-D|--directory]}} .Scan the
package-lock.json manifest file:vet scan {{[-M|--manifests]}} {{path/to/manifest_file}}Scan with filter to fail on any critical vulnerability found in the codebase:
vet scan {{[-D|--directory]}} {{path/to/directory}} --filter 'vulns.critical.exists(p, true)' --filter-failScan any OSS package for malware:
vet inspect malware --purl {{package_url}}Start the MCP server for AI enabled security in code editors like Cursor:
vet server mcpCode Snippets
Scan the current directory
vet scan {{[-D|--directory]}} .Scan the `package-lock.json` manifest file
vet scan {{[-M|--manifests]}} {{path/to/manifest_file}}Scan with filter to fail on any critical vulnerability found in the codebase
vet scan {{[-D|--directory]}} {{path/to/directory}} --filter 'vulns.critical.exists(p, true)' --filter-failScan any OSS package for malware
vet inspect malware --purl {{package_url}}Start the MCP server for AI enabled security in code editors like Cursor
vet server mcpContext
tldr-pages: common/vet
Revisions (0)
No revisions yet.