@enjoys/context-engine 1.0.0 → 1.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/data/commands/adb.json +322 -0
- package/data/commands/alembic.json +301 -0
- package/data/commands/artisan.json +277 -0
- package/data/commands/atlas.json +426 -0
- package/data/commands/auth0.json +648 -0
- package/data/commands/bat.json +84 -0
- package/data/commands/btop.json +59 -0
- package/data/commands/bundle.json +321 -0
- package/data/commands/composer.json +507 -0
- package/data/commands/dart.json +216 -0
- package/data/commands/dbmate.json +257 -0
- package/data/commands/docker-compose.json +384 -0
- package/data/commands/drizzle-kit.json +217 -0
- package/data/commands/expo.json +65 -0
- package/data/commands/fastlane.json +243 -0
- package/data/commands/fd.json +86 -0
- package/data/commands/flutter.json +298 -0
- package/data/commands/flyway.json +261 -0
- package/data/commands/fzf.json +103 -0
- package/data/commands/gem.json +267 -0
- package/data/commands/htop.json +56 -0
- package/data/commands/jq.json +100 -0
- package/data/commands/k9s.json +62 -0
- package/data/commands/linux.json +3007 -0
- package/data/commands/liquibase.json +399 -0
- package/data/commands/manifest.json +619 -0
- package/data/commands/minikube.json +60 -0
- package/data/commands/ng.json +64 -0
- package/data/commands/nuxt.json +60 -0
- package/data/commands/nvim.json +91 -0
- package/data/commands/php.json +157 -0
- package/data/commands/pm2.json +259 -0
- package/data/commands/pod.json +175 -0
- package/data/commands/prisma.json +257 -0
- package/data/commands/rails.json +372 -0
- package/data/commands/rake.json +360 -0
- package/data/commands/react-native.json +57 -0
- package/data/commands/rg.json +103 -0
- package/data/commands/rspec.json +257 -0
- package/data/commands/ruby.json +108 -0
- package/data/commands/screen.json +101 -0
- package/data/commands/sequelize.json +342 -0
- package/data/commands/snyk.json +442 -0
- package/data/commands/sonar-scanner.json +219 -0
- package/data/commands/stripe.json +314 -0
- package/data/commands/symfony.json +449 -0
- package/data/commands/tmux.json +197 -0
- package/data/commands/top.json +61 -0
- package/data/commands/trivy.json +367 -0
- package/data/commands/twilio.json +382 -0
- package/data/commands/typeorm.json +262 -0
- package/data/commands/vim.json +85 -0
- package/data/commands/vue.json +60 -0
- package/data/commands/wp.json +857 -0
- package/data/commands/xcodebuild.json +141 -0
- package/data/commands/yq.json +57 -0
- package/data/completion/bash.json +1184 -0
- package/data/completion/c.json +1067 -0
- package/data/completion/cpp.json +824 -0
- package/data/completion/csharp.json +860 -0
- package/data/completion/dockerfile.json +536 -0
- package/data/completion/go.json +1346 -0
- package/data/completion/html.json +806 -0
- package/data/completion/java.json +1112 -0
- package/data/completion/javascript.json +914 -0
- package/data/completion/lua.json +968 -0
- package/data/completion/php.json +1535 -0
- package/data/completion/python.json +1427 -0
- package/data/completion/ruby.json +1531 -0
- package/data/completion/rust.json +698 -0
- package/data/completion/sql.json +887 -0
- package/data/completion/toml.json +428 -0
- package/data/completion/typescript.json +338 -0
- package/data/completion/yaml.json +563 -0
- package/data/defination/bash.json +565 -0
- package/data/defination/c.json +865 -0
- package/data/defination/cpp.json +348 -0
- package/data/defination/csharp.json +144 -0
- package/data/defination/dockerfile.json +113 -0
- package/data/defination/go.json +561 -0
- package/data/defination/html.json +559 -0
- package/data/defination/java.json +184 -0
- package/data/defination/javascript.json +265 -0
- package/data/defination/lua.json +181 -0
- package/data/defination/php.json +726 -0
- package/data/defination/python.json +717 -0
- package/data/defination/ruby.json +670 -0
- package/data/defination/rust.json +207 -0
- package/data/defination/sql.json +473 -0
- package/data/defination/toml.json +251 -0
- package/data/defination/typescript.json +29 -0
- package/data/defination/yaml.json +197 -0
- package/data/hover/bash.json +245 -0
- package/data/hover/c.json +265 -0
- package/data/hover/cpp.json +210 -0
- package/data/hover/csharp.json +290 -0
- package/data/hover/dockerfile.json +145 -0
- package/data/hover/go.json +580 -0
- package/data/hover/html.json +250 -0
- package/data/hover/java.json +395 -0
- package/data/hover/javascript.json +330 -0
- package/data/hover/lua.json +265 -0
- package/data/hover/php.json +300 -0
- package/data/hover/python.json +380 -0
- package/data/hover/ruby.json +265 -0
- package/data/hover/rust.json +275 -0
- package/data/hover/sql.json +230 -0
- package/data/hover/toml.json +145 -0
- package/data/hover/typescript.json +120 -0
- package/data/hover/yaml.json +165 -0
- package/data/manifest.json +242 -0
- package/package.json +1 -1
|
@@ -0,0 +1,442 @@
|
|
|
1
|
+
{
|
|
2
|
+
"name": "snyk",
|
|
3
|
+
"description": "Snyk developer security platform CLI for finding and fixing vulnerabilities in code, open source dependencies, container images, and IaC configurations",
|
|
4
|
+
"category": "security",
|
|
5
|
+
"platforms": ["linux", "macos", "windows"],
|
|
6
|
+
"shells": ["bash", "zsh", "fish", "powershell"],
|
|
7
|
+
"subcommands": [
|
|
8
|
+
{
|
|
9
|
+
"name": "auth",
|
|
10
|
+
"description": "Authenticate the Snyk CLI with your Snyk account via browser or API token",
|
|
11
|
+
"args": [{ "name": "token", "type": "string", "required": false, "description": "API token for non-interactive authentication" }],
|
|
12
|
+
"options": [],
|
|
13
|
+
"examples": [
|
|
14
|
+
"snyk auth",
|
|
15
|
+
"snyk auth <api-token>"
|
|
16
|
+
]
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"name": "test",
|
|
20
|
+
"description": "Test a project for open source vulnerabilities and license issues",
|
|
21
|
+
"args": [{ "name": "path", "type": "string", "required": false, "description": "Path to the project directory or file (defaults to current dir)" }],
|
|
22
|
+
"options": [
|
|
23
|
+
{ "name": "--all-projects", "description": "Test all projects in the working directory" },
|
|
24
|
+
{ "name": "--detection-depth", "description": "Maximum directory depth for project detection", "type": "string" },
|
|
25
|
+
{ "name": "--exclude", "description": "Comma-separated list of directories to exclude", "type": "string" },
|
|
26
|
+
{ "name": "--prune-repeated-subdependencies", "description": "Prune dependency tree to reduce noise" },
|
|
27
|
+
{ "name": "--print-deps", "description": "Print the dependency tree before results" },
|
|
28
|
+
{ "name": "--remote-repo-url", "description": "Set or override the remote repo URL", "type": "string" },
|
|
29
|
+
{ "name": "--dev", "description": "Include development dependencies" },
|
|
30
|
+
{ "name": "--org", "description": "Specify the Snyk organization", "type": "string" },
|
|
31
|
+
{ "name": "--file", "description": "Specific manifest file to test", "type": "string" },
|
|
32
|
+
{ "name": "--package-manager", "description": "Force a specific package manager", "type": "string" },
|
|
33
|
+
{ "name": "--json", "description": "Output results in JSON format" },
|
|
34
|
+
{ "name": "--sarif", "description": "Output results in SARIF format" },
|
|
35
|
+
{ "name": "--severity-threshold", "description": "Only report issues at or above severity: low, medium, high, critical", "type": "string" },
|
|
36
|
+
{ "name": "--fail-on", "description": "Fail only for issues that are: all, upgradable, patchable", "type": "string" },
|
|
37
|
+
{ "name": "--policy-path", "description": "Path to a .snyk policy file", "type": "string" },
|
|
38
|
+
{ "name": "--project-name", "description": "Custom name for the project", "type": "string" },
|
|
39
|
+
{ "name": "--target-reference", "description": "Reference for the project (e.g., branch name)", "type": "string" },
|
|
40
|
+
{ "name": "--project-environment", "description": "Environment: frontend, backend, internal, external, mobile, saas, onprem, hosted, distributed", "type": "string" },
|
|
41
|
+
{ "name": "--project-lifecycle", "description": "Lifecycle: production, development, sandbox", "type": "string" },
|
|
42
|
+
{ "name": "--project-business-criticality", "description": "Business criticality: critical, high, medium, low", "type": "string" },
|
|
43
|
+
{ "name": "--project-tags", "description": "Tags in key=value format", "type": "string" },
|
|
44
|
+
{ "name": "--json-file-output", "description": "Save JSON output to file while showing human-readable output", "type": "string" },
|
|
45
|
+
{ "name": "--sarif-file-output", "description": "Save SARIF output to file", "type": "string" }
|
|
46
|
+
],
|
|
47
|
+
"examples": [
|
|
48
|
+
"snyk test",
|
|
49
|
+
"snyk test --all-projects",
|
|
50
|
+
"snyk test --severity-threshold=high",
|
|
51
|
+
"snyk test --json --json-file-output=results.json",
|
|
52
|
+
"snyk test --file=package.json --dev",
|
|
53
|
+
"snyk test --all-projects --detection-depth=4 --exclude=node_modules,dist",
|
|
54
|
+
"snyk test --fail-on=upgradable --severity-threshold=medium",
|
|
55
|
+
"snyk test --sarif --sarif-file-output=results.sarif"
|
|
56
|
+
]
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"name": "monitor",
|
|
60
|
+
"description": "Monitor a project and create a snapshot on Snyk for continuous monitoring",
|
|
61
|
+
"args": [{ "name": "path", "type": "string", "required": false, "description": "Path to the project" }],
|
|
62
|
+
"options": [
|
|
63
|
+
{ "name": "--all-projects", "description": "Monitor all projects in the directory" },
|
|
64
|
+
{ "name": "--detection-depth", "description": "Max depth for project detection", "type": "string" },
|
|
65
|
+
{ "name": "--exclude", "description": "Directories to exclude", "type": "string" },
|
|
66
|
+
{ "name": "--dev", "description": "Include dev dependencies" },
|
|
67
|
+
{ "name": "--org", "description": "Snyk organization", "type": "string" },
|
|
68
|
+
{ "name": "--file", "description": "Specific manifest file", "type": "string" },
|
|
69
|
+
{ "name": "--project-name", "description": "Custom project name", "type": "string" },
|
|
70
|
+
{ "name": "--remote-repo-url", "description": "Remote repository URL", "type": "string" },
|
|
71
|
+
{ "name": "--target-reference", "description": "Target reference (branch)", "type": "string" },
|
|
72
|
+
{ "name": "--project-environment", "description": "Project environment", "type": "string" },
|
|
73
|
+
{ "name": "--project-lifecycle", "description": "Project lifecycle stage", "type": "string" },
|
|
74
|
+
{ "name": "--project-business-criticality", "description": "Business criticality", "type": "string" },
|
|
75
|
+
{ "name": "--project-tags", "description": "Project tags", "type": "string" },
|
|
76
|
+
{ "name": "--json", "description": "Output in JSON format" }
|
|
77
|
+
],
|
|
78
|
+
"examples": [
|
|
79
|
+
"snyk monitor",
|
|
80
|
+
"snyk monitor --all-projects",
|
|
81
|
+
"snyk monitor --project-name='my-app' --org=my-org",
|
|
82
|
+
"snyk monitor --all-projects --target-reference=main"
|
|
83
|
+
]
|
|
84
|
+
},
|
|
85
|
+
{
|
|
86
|
+
"name": "fix",
|
|
87
|
+
"description": "Apply the recommended fixes for vulnerabilities found in supported projects",
|
|
88
|
+
"args": [],
|
|
89
|
+
"options": [
|
|
90
|
+
{ "name": "--all-projects", "description": "Fix all projects" },
|
|
91
|
+
{ "name": "--org", "description": "Snyk organization", "type": "string" },
|
|
92
|
+
{ "name": "--file", "description": "Manifest file", "type": "string" },
|
|
93
|
+
{ "name": "--dry-run", "description": "Preview fixes without applying them" },
|
|
94
|
+
{ "name": "--sequential", "description": "Apply fixes one at a time" }
|
|
95
|
+
],
|
|
96
|
+
"examples": [
|
|
97
|
+
"snyk fix",
|
|
98
|
+
"snyk fix --all-projects",
|
|
99
|
+
"snyk fix --dry-run"
|
|
100
|
+
]
|
|
101
|
+
},
|
|
102
|
+
{
|
|
103
|
+
"name": "code test",
|
|
104
|
+
"description": "Run Static Application Security Testing (SAST) to find vulnerabilities in source code",
|
|
105
|
+
"args": [{ "name": "path", "type": "string", "required": false, "description": "Path to source code" }],
|
|
106
|
+
"options": [
|
|
107
|
+
{ "name": "--org", "description": "Snyk organization", "type": "string" },
|
|
108
|
+
{ "name": "--json", "description": "Output in JSON format" },
|
|
109
|
+
{ "name": "--sarif", "description": "Output in SARIF format" },
|
|
110
|
+
{ "name": "--severity-threshold", "description": "Minimum severity: low, medium, high", "type": "string" },
|
|
111
|
+
{ "name": "--json-file-output", "description": "Save JSON output to file", "type": "string" },
|
|
112
|
+
{ "name": "--sarif-file-output", "description": "Save SARIF output to file", "type": "string" }
|
|
113
|
+
],
|
|
114
|
+
"examples": [
|
|
115
|
+
"snyk code test",
|
|
116
|
+
"snyk code test --severity-threshold=high",
|
|
117
|
+
"snyk code test --json --json-file-output=sast-results.json",
|
|
118
|
+
"snyk code test --sarif --sarif-file-output=code.sarif"
|
|
119
|
+
]
|
|
120
|
+
},
|
|
121
|
+
{
|
|
122
|
+
"name": "container test",
|
|
123
|
+
"description": "Scan a container image for known vulnerabilities",
|
|
124
|
+
"args": [{ "name": "image", "type": "string", "required": true, "description": "Container image to test (e.g., nginx:latest)" }],
|
|
125
|
+
"options": [
|
|
126
|
+
{ "name": "--file", "description": "Path to the Dockerfile for base image remediation", "type": "string" },
|
|
127
|
+
{ "name": "--json", "description": "Output in JSON format" },
|
|
128
|
+
{ "name": "--sarif", "description": "Output in SARIF format" },
|
|
129
|
+
{ "name": "--severity-threshold", "description": "Minimum severity to report", "type": "string" },
|
|
130
|
+
{ "name": "--exclude-base-image-vulns", "description": "Exclude vulnerabilities from the base image" },
|
|
131
|
+
{ "name": "--platform", "description": "Target platform for multi-arch images", "type": "string" },
|
|
132
|
+
{ "name": "--org", "description": "Snyk organization", "type": "string" },
|
|
133
|
+
{ "name": "--fail-on", "description": "Fail on: all, upgradable, patchable", "type": "string" },
|
|
134
|
+
{ "name": "--nested-jars-depth", "description": "Depth for scanning nested JARs", "type": "string" },
|
|
135
|
+
{ "name": "--app-vulns", "description": "Also scan application dependencies in the image" },
|
|
136
|
+
{ "name": "--exclude-app-vulns", "description": "Exclude application vulnerabilities" },
|
|
137
|
+
{ "name": "--json-file-output", "description": "Save JSON output to file", "type": "string" },
|
|
138
|
+
{ "name": "--sarif-file-output", "description": "Save SARIF output to file", "type": "string" }
|
|
139
|
+
],
|
|
140
|
+
"examples": [
|
|
141
|
+
"snyk container test nginx:latest",
|
|
142
|
+
"snyk container test --severity-threshold=high node:20-slim",
|
|
143
|
+
"snyk container test --file=Dockerfile --exclude-base-image-vulns myapp:latest",
|
|
144
|
+
"snyk container test --json --json-file-output=container.json python:3.11",
|
|
145
|
+
"snyk container test --platform=linux/amd64 myapp:latest"
|
|
146
|
+
]
|
|
147
|
+
},
|
|
148
|
+
{
|
|
149
|
+
"name": "container monitor",
|
|
150
|
+
"description": "Monitor a container image for continuous vulnerability tracking",
|
|
151
|
+
"args": [{ "name": "image", "type": "string", "required": true, "description": "Container image to monitor" }],
|
|
152
|
+
"options": [
|
|
153
|
+
{ "name": "--file", "description": "Path to Dockerfile", "type": "string" },
|
|
154
|
+
{ "name": "--org", "description": "Snyk organization", "type": "string" },
|
|
155
|
+
{ "name": "--project-name", "description": "Custom project name", "type": "string" },
|
|
156
|
+
{ "name": "--project-environment", "description": "Project environment", "type": "string" },
|
|
157
|
+
{ "name": "--project-tags", "description": "Project tags", "type": "string" },
|
|
158
|
+
{ "name": "--app-vulns", "description": "Also monitor app dependencies" },
|
|
159
|
+
{ "name": "--json", "description": "Output in JSON format" }
|
|
160
|
+
],
|
|
161
|
+
"examples": [
|
|
162
|
+
"snyk container monitor nginx:latest",
|
|
163
|
+
"snyk container monitor --project-name=my-nginx myapp:latest"
|
|
164
|
+
]
|
|
165
|
+
},
|
|
166
|
+
{
|
|
167
|
+
"name": "iac test",
|
|
168
|
+
"description": "Scan Infrastructure as Code files for misconfigurations and security issues",
|
|
169
|
+
"args": [{ "name": "path", "type": "string", "required": false, "description": "Path to IaC files or directory" }],
|
|
170
|
+
"options": [
|
|
171
|
+
{ "name": "--org", "description": "Snyk organization", "type": "string" },
|
|
172
|
+
{ "name": "--json", "description": "Output in JSON format" },
|
|
173
|
+
{ "name": "--sarif", "description": "Output in SARIF format" },
|
|
174
|
+
{ "name": "--severity-threshold", "description": "Minimum severity", "type": "string" },
|
|
175
|
+
{ "name": "--detection-depth", "description": "Max depth for file detection", "type": "string" },
|
|
176
|
+
{ "name": "--rules", "description": "Path to custom rules bundle", "type": "string" },
|
|
177
|
+
{ "name": "--report", "description": "Share results with Snyk web UI" },
|
|
178
|
+
{ "name": "--target-name", "description": "Custom target name", "type": "string" },
|
|
179
|
+
{ "name": "--target-reference", "description": "Target reference (branch)", "type": "string" },
|
|
180
|
+
{ "name": "--scan", "description": "Scan type: resource-changes, planned-values", "type": "string" },
|
|
181
|
+
{ "name": "--var-file", "description": "Path to Terraform variable definitions file", "type": "string" },
|
|
182
|
+
{ "name": "--json-file-output", "description": "Save JSON output to file", "type": "string" },
|
|
183
|
+
{ "name": "--sarif-file-output", "description": "Save SARIF output to file", "type": "string" }
|
|
184
|
+
],
|
|
185
|
+
"examples": [
|
|
186
|
+
"snyk iac test",
|
|
187
|
+
"snyk iac test ./terraform",
|
|
188
|
+
"snyk iac test --severity-threshold=high .",
|
|
189
|
+
"snyk iac test --json --json-file-output=iac.json .",
|
|
190
|
+
"snyk iac test --report --target-name=my-infra ./infra",
|
|
191
|
+
"snyk iac test --var-file=terraform.tfvars ./terraform"
|
|
192
|
+
]
|
|
193
|
+
},
|
|
194
|
+
{
|
|
195
|
+
"name": "iac describe",
|
|
196
|
+
"description": "Detect infrastructure drift and unmanaged cloud resources",
|
|
197
|
+
"args": [],
|
|
198
|
+
"options": [
|
|
199
|
+
{ "name": "--org", "description": "Snyk organization", "type": "string" },
|
|
200
|
+
{ "name": "--from", "description": "IaC source: tfstate, tfstate+s3, tfstate+gs, tfstate+azurerm", "type": "string" },
|
|
201
|
+
{ "name": "--to", "description": "Cloud provider to scan: aws+tf, azure+tf, gcp+tf, github+tf", "type": "string" },
|
|
202
|
+
{ "name": "--service", "description": "Comma-separated services to scan", "type": "string" },
|
|
203
|
+
{ "name": "--all", "description": "Show all resources" },
|
|
204
|
+
{ "name": "--only-managed", "description": "Show only managed resources" },
|
|
205
|
+
{ "name": "--only-unmanaged", "description": "Show only unmanaged resources" },
|
|
206
|
+
{ "name": "--drift", "description": "Show only drifted resources" },
|
|
207
|
+
{ "name": "--json", "description": "Output in JSON format" },
|
|
208
|
+
{ "name": "--html", "description": "Output in HTML format" },
|
|
209
|
+
{ "name": "--fetch-tfstate-headers", "description": "Custom headers for remote tfstate fetch", "type": "string" },
|
|
210
|
+
{ "name": "--tf-provider-version", "description": "Terraform provider version", "type": "string" },
|
|
211
|
+
{ "name": "--strict", "description": "Fail if any resource cannot be read" },
|
|
212
|
+
{ "name": "--deep", "description": "Enable deep mode for detailed attribute scanning" },
|
|
213
|
+
{ "name": "--tf-lockfile", "description": "Path to Terraform lockfile", "type": "string" }
|
|
214
|
+
],
|
|
215
|
+
"examples": [
|
|
216
|
+
"snyk iac describe --from=tfstate --to=aws+tf",
|
|
217
|
+
"snyk iac describe --only-unmanaged --from=tfstate",
|
|
218
|
+
"snyk iac describe --drift --service=aws_s3 --json",
|
|
219
|
+
"snyk iac describe --from=tfstate+s3://mybucket/terraform.tfstate --to=aws+tf"
|
|
220
|
+
]
|
|
221
|
+
},
|
|
222
|
+
{
|
|
223
|
+
"name": "iac capture",
|
|
224
|
+
"description": "Generate a mapping artifact for IaC drift detection",
|
|
225
|
+
"args": [{ "name": "path", "type": "string", "required": false, "description": "Path to state file or Terraform directory" }],
|
|
226
|
+
"options": [
|
|
227
|
+
{ "name": "--org", "description": "Snyk organization", "type": "string" }
|
|
228
|
+
],
|
|
229
|
+
"examples": ["snyk iac capture", "snyk iac capture ./terraform"]
|
|
230
|
+
},
|
|
231
|
+
{
|
|
232
|
+
"name": "iac rules init",
|
|
233
|
+
"description": "Initialize a new custom rules project",
|
|
234
|
+
"args": [],
|
|
235
|
+
"options": [],
|
|
236
|
+
"examples": ["snyk iac rules init"]
|
|
237
|
+
},
|
|
238
|
+
{
|
|
239
|
+
"name": "iac update-exclude-policy",
|
|
240
|
+
"description": "Update the .snyk exclude policy for IaC drift",
|
|
241
|
+
"args": [],
|
|
242
|
+
"options": [
|
|
243
|
+
{ "name": "--exclude-changed", "description": "Exclude drifted resources" },
|
|
244
|
+
{ "name": "--exclude-missing", "description": "Exclude deleted resources" },
|
|
245
|
+
{ "name": "--exclude-unmanaged", "description": "Exclude unmanaged resources" }
|
|
246
|
+
],
|
|
247
|
+
"examples": ["snyk iac update-exclude-policy --exclude-unmanaged"]
|
|
248
|
+
},
|
|
249
|
+
{
|
|
250
|
+
"name": "log4shell",
|
|
251
|
+
"description": "Scan for Log4Shell (CVE-2021-44228) vulnerabilities",
|
|
252
|
+
"args": [{ "name": "path", "type": "string", "required": false, "description": "Path to scan" }],
|
|
253
|
+
"options": [],
|
|
254
|
+
"examples": ["snyk log4shell", "snyk log4shell /path/to/project"]
|
|
255
|
+
},
|
|
256
|
+
{
|
|
257
|
+
"name": "sbom test",
|
|
258
|
+
"description": "Test an SBOM document for known vulnerabilities",
|
|
259
|
+
"args": [],
|
|
260
|
+
"options": [
|
|
261
|
+
{ "name": "--file", "description": "Path to the SBOM file", "type": "string" },
|
|
262
|
+
{ "name": "--json", "description": "Output in JSON format" },
|
|
263
|
+
{ "name": "--org", "description": "Snyk organization", "type": "string" }
|
|
264
|
+
],
|
|
265
|
+
"examples": [
|
|
266
|
+
"snyk sbom test --file=sbom.cdx.json",
|
|
267
|
+
"snyk sbom test --file=sbom.spdx.json --json"
|
|
268
|
+
]
|
|
269
|
+
},
|
|
270
|
+
{
|
|
271
|
+
"name": "sbom monitor",
|
|
272
|
+
"description": "Monitor an SBOM for continuous vulnerability checking",
|
|
273
|
+
"args": [],
|
|
274
|
+
"options": [
|
|
275
|
+
{ "name": "--file", "description": "Path to the SBOM file", "type": "string" },
|
|
276
|
+
{ "name": "--org", "description": "Snyk organization", "type": "string" },
|
|
277
|
+
{ "name": "--project-name", "description": "Custom project name", "type": "string" }
|
|
278
|
+
],
|
|
279
|
+
"examples": ["snyk sbom monitor --file=sbom.cdx.json --project-name=my-sbom"]
|
|
280
|
+
},
|
|
281
|
+
{
|
|
282
|
+
"name": "config get",
|
|
283
|
+
"description": "Get a Snyk CLI config value",
|
|
284
|
+
"args": [{ "name": "key", "type": "string", "required": true, "description": "Config key to retrieve" }],
|
|
285
|
+
"options": [],
|
|
286
|
+
"examples": ["snyk config get org", "snyk config get api"]
|
|
287
|
+
},
|
|
288
|
+
{
|
|
289
|
+
"name": "config set",
|
|
290
|
+
"description": "Set a Snyk CLI config value",
|
|
291
|
+
"args": [{ "name": "key=value", "type": "string", "required": true, "description": "Config key=value pair" }],
|
|
292
|
+
"options": [],
|
|
293
|
+
"examples": [
|
|
294
|
+
"snyk config set org=my-org",
|
|
295
|
+
"snyk config set api=<api-token>",
|
|
296
|
+
"snyk config set endpoint=https://snyk.example.com/api"
|
|
297
|
+
]
|
|
298
|
+
},
|
|
299
|
+
{
|
|
300
|
+
"name": "config unset",
|
|
301
|
+
"description": "Remove a Snyk CLI config value",
|
|
302
|
+
"args": [{ "name": "key", "type": "string", "required": true, "description": "Config key to remove" }],
|
|
303
|
+
"options": [],
|
|
304
|
+
"examples": ["snyk config unset org"]
|
|
305
|
+
},
|
|
306
|
+
{
|
|
307
|
+
"name": "config clear",
|
|
308
|
+
"description": "Clear all Snyk CLI configuration",
|
|
309
|
+
"args": [],
|
|
310
|
+
"options": [],
|
|
311
|
+
"examples": ["snyk config clear"]
|
|
312
|
+
},
|
|
313
|
+
{
|
|
314
|
+
"name": "policy wizard",
|
|
315
|
+
"description": "Interactive wizard to generate or update the .snyk policy file",
|
|
316
|
+
"args": [],
|
|
317
|
+
"options": [],
|
|
318
|
+
"examples": ["snyk policy wizard"]
|
|
319
|
+
},
|
|
320
|
+
{
|
|
321
|
+
"name": "ignore",
|
|
322
|
+
"description": "Add a vulnerability ignore rule to the .snyk policy file",
|
|
323
|
+
"args": [],
|
|
324
|
+
"options": [
|
|
325
|
+
{ "name": "--id", "description": "Vulnerability ID to ignore", "type": "string" },
|
|
326
|
+
{ "name": "--expiry", "description": "Expiry date for the ignore rule (YYYY-MM-DD)", "type": "string" },
|
|
327
|
+
{ "name": "--reason", "description": "Reason for ignoring", "type": "string" },
|
|
328
|
+
{ "name": "--path", "description": "Dependency path to ignore", "type": "string" }
|
|
329
|
+
],
|
|
330
|
+
"examples": [
|
|
331
|
+
"snyk ignore --id=SNYK-JS-LODASH-590103 --reason='No fix available' --expiry=2025-12-31",
|
|
332
|
+
"snyk ignore --id=npm:lodash:20210101"
|
|
333
|
+
]
|
|
334
|
+
},
|
|
335
|
+
{
|
|
336
|
+
"name": "wizard",
|
|
337
|
+
"description": "Interactive wizard to walk through finding and fixing known vulnerabilities",
|
|
338
|
+
"args": [],
|
|
339
|
+
"options": [],
|
|
340
|
+
"examples": ["snyk wizard"]
|
|
341
|
+
},
|
|
342
|
+
{
|
|
343
|
+
"name": "apps create",
|
|
344
|
+
"description": "Create a new Snyk App",
|
|
345
|
+
"args": [],
|
|
346
|
+
"options": [
|
|
347
|
+
{ "name": "--name", "description": "App name", "type": "string" },
|
|
348
|
+
{ "name": "--redirect-uris", "description": "Comma-separated redirect URIs", "type": "string" },
|
|
349
|
+
{ "name": "--scopes", "description": "Comma-separated scopes", "type": "string" },
|
|
350
|
+
{ "name": "--org", "description": "Snyk organization", "type": "string" }
|
|
351
|
+
],
|
|
352
|
+
"examples": ["snyk apps create --name='My Integration' --redirect-uris=https://example.com/callback --scopes=org.read"]
|
|
353
|
+
},
|
|
354
|
+
{
|
|
355
|
+
"name": "apps list",
|
|
356
|
+
"description": "List Snyk Apps in the organization",
|
|
357
|
+
"args": [],
|
|
358
|
+
"options": [
|
|
359
|
+
{ "name": "--org", "description": "Snyk organization", "type": "string" }
|
|
360
|
+
],
|
|
361
|
+
"examples": ["snyk apps list --org=my-org"]
|
|
362
|
+
},
|
|
363
|
+
{
|
|
364
|
+
"name": "apps delete",
|
|
365
|
+
"description": "Delete a Snyk App",
|
|
366
|
+
"args": [{ "name": "app-id", "type": "string", "required": true, "description": "App ID to delete" }],
|
|
367
|
+
"options": [
|
|
368
|
+
{ "name": "--org", "description": "Snyk organization", "type": "string" }
|
|
369
|
+
],
|
|
370
|
+
"examples": ["snyk apps delete <app-id> --org=my-org"]
|
|
371
|
+
}
|
|
372
|
+
],
|
|
373
|
+
"globalOptions": [
|
|
374
|
+
{ "name": "--help", "short": "-h", "description": "Show help information" },
|
|
375
|
+
{ "name": "--version", "description": "Show Snyk CLI version" },
|
|
376
|
+
{ "name": "--json", "description": "Output results in JSON format" },
|
|
377
|
+
{ "name": "--sarif", "description": "Output results in SARIF format" },
|
|
378
|
+
{ "name": "--org", "description": "Specify the Snyk organization to use", "type": "string" },
|
|
379
|
+
{ "name": "--severity-threshold", "description": "Minimum severity: low, medium, high, critical", "type": "string" },
|
|
380
|
+
{ "name": "--debug", "short": "-d", "description": "Enable debug output" },
|
|
381
|
+
{ "name": "--insecure", "description": "Ignore SSL certificate errors" },
|
|
382
|
+
{ "name": "--all-projects", "description": "Scan all projects in the working directory" },
|
|
383
|
+
{ "name": "--detection-depth", "description": "Maximum depth for project file detection", "type": "string" },
|
|
384
|
+
{ "name": "--file", "description": "Specify a package manifest file to test or monitor", "type": "string" },
|
|
385
|
+
{ "name": "--policy-path", "description": "Path to the .snyk policy file", "type": "string" }
|
|
386
|
+
],
|
|
387
|
+
"examples": [
|
|
388
|
+
"snyk auth",
|
|
389
|
+
"snyk test",
|
|
390
|
+
"snyk test --all-projects --severity-threshold=high",
|
|
391
|
+
"snyk monitor --all-projects",
|
|
392
|
+
"snyk code test --severity-threshold=medium",
|
|
393
|
+
"snyk container test nginx:latest --severity-threshold=high",
|
|
394
|
+
"snyk container monitor myapp:latest --project-name=my-docker-app",
|
|
395
|
+
"snyk iac test ./terraform --severity-threshold=medium",
|
|
396
|
+
"snyk iac describe --from=tfstate --to=aws+tf --drift",
|
|
397
|
+
"snyk fix --all-projects --dry-run",
|
|
398
|
+
"snyk ignore --id=SNYK-JS-LODASH-590103 --reason='Accepted risk'",
|
|
399
|
+
"snyk config set org=my-org",
|
|
400
|
+
"snyk sbom test --file=sbom.cdx.json"
|
|
401
|
+
],
|
|
402
|
+
"relatedCommands": ["trivy", "npm", "docker", "pip"],
|
|
403
|
+
"contextEngine": {
|
|
404
|
+
"detectors": [
|
|
405
|
+
{
|
|
406
|
+
"name": "snyk_version",
|
|
407
|
+
"description": "Detect installed Snyk CLI version",
|
|
408
|
+
"command": "snyk --version 2>/dev/null",
|
|
409
|
+
"parser": "lines",
|
|
410
|
+
"cacheFor": 300
|
|
411
|
+
},
|
|
412
|
+
{
|
|
413
|
+
"name": "snyk_auth",
|
|
414
|
+
"description": "Detect Snyk authentication status",
|
|
415
|
+
"command": "snyk config get api 2>/dev/null",
|
|
416
|
+
"parser": "lines",
|
|
417
|
+
"cacheFor": 120
|
|
418
|
+
},
|
|
419
|
+
{
|
|
420
|
+
"name": "snyk_org",
|
|
421
|
+
"description": "Detect configured Snyk organization",
|
|
422
|
+
"command": "snyk config get org 2>/dev/null",
|
|
423
|
+
"parser": "lines",
|
|
424
|
+
"cacheFor": 120
|
|
425
|
+
},
|
|
426
|
+
{
|
|
427
|
+
"name": "snyk_policy",
|
|
428
|
+
"description": "Detect .snyk policy file in the project",
|
|
429
|
+
"command": "test -f .snyk && echo 'found' || echo 'not found'",
|
|
430
|
+
"parser": "lines",
|
|
431
|
+
"cacheFor": 30
|
|
432
|
+
},
|
|
433
|
+
{
|
|
434
|
+
"name": "project_manifests",
|
|
435
|
+
"description": "Detect project manifest files for scanning context",
|
|
436
|
+
"command": "ls package.json requirements.txt Gemfile go.mod pom.xml build.gradle Pipfile composer.json 2>/dev/null",
|
|
437
|
+
"parser": "lines",
|
|
438
|
+
"cacheFor": 30
|
|
439
|
+
}
|
|
440
|
+
]
|
|
441
|
+
}
|
|
442
|
+
}
|