commands.sh

vet

all

Scan package manifests, directories, container images, or GitHub repositories to identify vulnerabilities, malicious packages, and enforce security policies using CEL expressions.

More info →

Options (2)

-D, --directoryboolean

Scan the current directory

Example: vet scan {{[-D|--directory]}} .
-M, --manifestsboolean

Scan the `package-lock.json` manifest file

Example: vet scan {{[-M|--manifests]}} {{path/to/manifest_file}}

Examples (5)

Scan the current directory

vet scan [-D|--directory] .

Scan the `package-lock.json` manifest file

vet scan [-M|--manifests] path/to/manifest_file

Scan with filter to fail on any critical vulnerability found in the codebase

vet scan [-D|--directory] path/to/directory --filter 'vulns.critical.exists(p, true)' --filter-fail

Scan any OSS package for malware

vet inspect malware --purl package_url

Start the MCP server for AI enabled security in code editors like Cursor

vet server mcp
made by @shridhargupta | data from tldr-pages