vet
all
Scan package manifests, directories, container images, or GitHub repositories to identify vulnerabilities, malicious packages, and enforce security policies using CEL expressions.
More info →Options (2)
-D, --directorybooleanScan the current directory
Example:
vet scan {{[-D|--directory]}} .-M, --manifestsbooleanScan the `package-lock.json` manifest file
Example:
vet scan {{[-M|--manifests]}} {{path/to/manifest_file}}Examples (5)
Scan the current directory
vet scan [-D|--directory] .Scan the `package-lock.json` manifest file
vet scan [-M|--manifests] path/to/manifest_fileScan with filter to fail on any critical vulnerability found in the codebase
vet scan [-D|--directory] path/to/directory --filter 'vulns.critical.exists(p, true)' --filter-failScan any OSS package for malware
vet inspect malware --purl package_urlStart the MCP server for AI enabled security in code editors like Cursor
vet server mcpmade by @shridhargupta | data from tldr-pages