prismor 0.1.2__py3-none-any.whl → 1.1.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- prismor/__init__.py +1 -1
- prismor/api.py +347 -22
- prismor/cli.py +354 -72
- prismor-1.1.1.dist-info/METADATA +744 -0
- prismor-1.1.1.dist-info/RECORD +9 -0
- {prismor-0.1.2.dist-info → prismor-1.1.1.dist-info}/WHEEL +1 -1
- prismor-0.1.2.dist-info/METADATA +0 -371
- prismor-0.1.2.dist-info/RECORD +0 -9
- {prismor-0.1.2.dist-info → prismor-1.1.1.dist-info}/entry_points.txt +0 -0
- {prismor-0.1.2.dist-info → prismor-1.1.1.dist-info}/licenses/LICENSE +0 -0
- {prismor-0.1.2.dist-info → prismor-1.1.1.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,744 @@
|
|
|
1
|
+
Metadata-Version: 2.4
|
|
2
|
+
Name: prismor
|
|
3
|
+
Version: 1.1.1
|
|
4
|
+
Summary: A CLI tool for scanning GitHub repositories for vulnerabilities, secrets, and generating SBOMs
|
|
5
|
+
Home-page: https://github.com/PrismorSec/prismor-cli
|
|
6
|
+
Author: Prismor
|
|
7
|
+
Author-email: support@prismor.dev
|
|
8
|
+
Project-URL: Bug Reports, https://github.com/PrismorSec/prismor-cli/issues
|
|
9
|
+
Project-URL: Source, https://github.com/PrismorSec/prismor-cli
|
|
10
|
+
Project-URL: Documentation, https://docs.prismor.dev
|
|
11
|
+
Project-URL: Homepage, https://prismor.dev
|
|
12
|
+
Keywords: security scanning vulnerability sbom secrets github
|
|
13
|
+
Classifier: Development Status :: 4 - Beta
|
|
14
|
+
Classifier: Intended Audience :: Developers
|
|
15
|
+
Classifier: Topic :: Security
|
|
16
|
+
Classifier: Topic :: Software Development :: Quality Assurance
|
|
17
|
+
Classifier: License :: OSI Approved :: MIT License
|
|
18
|
+
Classifier: Programming Language :: Python :: 3
|
|
19
|
+
Classifier: Programming Language :: Python :: 3.7
|
|
20
|
+
Classifier: Programming Language :: Python :: 3.8
|
|
21
|
+
Classifier: Programming Language :: Python :: 3.9
|
|
22
|
+
Classifier: Programming Language :: Python :: 3.10
|
|
23
|
+
Classifier: Programming Language :: Python :: 3.11
|
|
24
|
+
Classifier: Programming Language :: Python :: 3.12
|
|
25
|
+
Requires-Python: >=3.7
|
|
26
|
+
Description-Content-Type: text/markdown
|
|
27
|
+
License-File: LICENSE
|
|
28
|
+
Requires-Dist: click>=8.0.0
|
|
29
|
+
Requires-Dist: requests>=2.25.0
|
|
30
|
+
Dynamic: author
|
|
31
|
+
Dynamic: author-email
|
|
32
|
+
Dynamic: classifier
|
|
33
|
+
Dynamic: description
|
|
34
|
+
Dynamic: description-content-type
|
|
35
|
+
Dynamic: home-page
|
|
36
|
+
Dynamic: keywords
|
|
37
|
+
Dynamic: license-file
|
|
38
|
+
Dynamic: project-url
|
|
39
|
+
Dynamic: requires-dist
|
|
40
|
+
Dynamic: requires-python
|
|
41
|
+
Dynamic: summary
|
|
42
|
+
|
|
43
|
+
# Prismor CLI
|
|
44
|
+
|
|
45
|
+
A powerful command-line tool for scanning GitHub repositories for security vulnerabilities, secrets, and generating Software Bill of Materials (SBOM).
|
|
46
|
+
|
|
47
|
+
**Get started at [https://prismor.dev](https://prismor.dev)** - Sign up for free to get your API key and access full dashboarding and analysis features!
|
|
48
|
+
|
|
49
|
+
## Features
|
|
50
|
+
|
|
51
|
+
- 🔍 **Vulnerability Scanning (scan)** - Detect security vulnerabilities in your codebase
|
|
52
|
+
- 🔐 **Secret Detection** - Find exposed secrets, API keys, and credentials
|
|
53
|
+
- 📦 **SBOM Generation** - Generate comprehensive Software Bill of Materials
|
|
54
|
+
- ⚡ **Full Scan** - Run all security checks in one command
|
|
55
|
+
- 🎨 **Beautiful CLI Output** - Colorful, easy-to-read results
|
|
56
|
+
- 🔗 **Flexible Repository Input** - Support for multiple GitHub URL formats including SSH, HTTPS, and bare domain formats
|
|
57
|
+
|
|
58
|
+
## Quick Start
|
|
59
|
+
|
|
60
|
+
1. **Sign up** at [https://prismor.dev](https://prismor.dev)
|
|
61
|
+
2. **Generate your API Key** from the dashboard
|
|
62
|
+
3. **Install** the CLI: `pip install prismor`
|
|
63
|
+
4. **Set your API key**: `export PRISMOR_API_KEY=your_api_key`
|
|
64
|
+
5. **Run your first scan**: `prismor --repo username/repo --fullscan`
|
|
65
|
+
|
|
66
|
+
For the complete analysis with dashboards and reports, visit [Prismor.dev](https://prismor.dev) after running scans!
|
|
67
|
+
|
|
68
|
+
## Installation
|
|
69
|
+
|
|
70
|
+
Install Prismor CLI via pip:
|
|
71
|
+
|
|
72
|
+
```bash
|
|
73
|
+
pip install prismor
|
|
74
|
+
```
|
|
75
|
+
|
|
76
|
+
## Prerequisites
|
|
77
|
+
|
|
78
|
+
### Getting Your API Key
|
|
79
|
+
|
|
80
|
+
Before using Prismor CLI, you need to get your API key from [Prismor.dev](https://prismor.dev):
|
|
81
|
+
|
|
82
|
+
1. Visit [https://prismor.dev](https://prismor.dev)
|
|
83
|
+
2. **Sign up** for a free account
|
|
84
|
+
3. Navigate to your dashboard
|
|
85
|
+
4. **Generate an API Key**
|
|
86
|
+
5. Copy your API key
|
|
87
|
+
|
|
88
|
+
### Setting Up Your API Key
|
|
89
|
+
|
|
90
|
+
Once you have your API key, set it as an environment variable:
|
|
91
|
+
|
|
92
|
+
```bash
|
|
93
|
+
export PRISMOR_API_KEY=your_api_key_here
|
|
94
|
+
```
|
|
95
|
+
|
|
96
|
+
To make this permanent, add it to your shell configuration file (`~/.bashrc`, `~/.zshrc`, etc.):
|
|
97
|
+
|
|
98
|
+
```bash
|
|
99
|
+
echo 'export PRISMOR_API_KEY=your_api_key_here' >> ~/.zshrc
|
|
100
|
+
source ~/.zshrc
|
|
101
|
+
```
|
|
102
|
+
|
|
103
|
+
### Private Repositories
|
|
104
|
+
|
|
105
|
+
To scan **private repositories**, you need to integrate your GitHub account:
|
|
106
|
+
|
|
107
|
+
1. Go to [Prismor.dev](https://prismor.dev)
|
|
108
|
+
2. Navigate to **Settings** or **Integrations**
|
|
109
|
+
3. **Connect your GitHub account**
|
|
110
|
+
4. Authorize Prismor to access your private repositories
|
|
111
|
+
|
|
112
|
+
This allows Prismor to securely access and scan your private repositories.
|
|
113
|
+
|
|
114
|
+
## Usage
|
|
115
|
+
|
|
116
|
+
### Basic Syntax
|
|
117
|
+
|
|
118
|
+
```bash
|
|
119
|
+
prismor --repo <repository> [scan-type]
|
|
120
|
+
```
|
|
121
|
+
|
|
122
|
+
**Note**: The `--scan` flag is used to enable vulnerability scanning, while `--repo` specifies the repository to scan.
|
|
123
|
+
|
|
124
|
+
### Repository Format
|
|
125
|
+
|
|
126
|
+
Prismor CLI supports multiple GitHub repository URL formats for maximum flexibility:
|
|
127
|
+
|
|
128
|
+
#### 1. **Username/Repository format** (recommended):
|
|
129
|
+
```bash
|
|
130
|
+
prismor --repo Ar9av/trychai-web-revamped --fullscan
|
|
131
|
+
```
|
|
132
|
+
|
|
133
|
+
#### 2. **HTTPS URLs**:
|
|
134
|
+
```bash
|
|
135
|
+
prismor --repo https://github.com/Ar9av/trychai-web-revamped --fullscan
|
|
136
|
+
prismor --repo https://www.github.com/Ar9av/trychai-web-revamped --fullscan
|
|
137
|
+
prismor --repo https://github.com/Ar9av/trychai-web-revamped.git --fullscan
|
|
138
|
+
```
|
|
139
|
+
|
|
140
|
+
#### 3. **HTTP URLs**:
|
|
141
|
+
```bash
|
|
142
|
+
prismor --repo http://github.com/Ar9av/trychai-web-revamped --fullscan
|
|
143
|
+
prismor --repo http://www.github.com/Ar9av/trychai-web-revamped --fullscan
|
|
144
|
+
```
|
|
145
|
+
|
|
146
|
+
#### 4. **Bare domain formats**:
|
|
147
|
+
```bash
|
|
148
|
+
prismor --repo github.com/Ar9av/trychai-web-revamped --fullscan
|
|
149
|
+
prismor --repo www.github.com/Ar9av/trychai-web-revamped --fullscan
|
|
150
|
+
```
|
|
151
|
+
|
|
152
|
+
#### 5. **SSH format**:
|
|
153
|
+
```bash
|
|
154
|
+
prismor --repo git@github.com:Ar9av/trychai-web-revamped.git --fullscan
|
|
155
|
+
```
|
|
156
|
+
|
|
157
|
+
#### 6. **URLs with paths and fragments**:
|
|
158
|
+
```bash
|
|
159
|
+
prismor --repo https://github.com/Ar9av/trychai-web-revamped/tree/main --fullscan
|
|
160
|
+
prismor --repo https://github.com/Ar9av/trychai-web-revamped/blob/main/file.py --fullscan
|
|
161
|
+
prismor --repo https://github.com/Ar9av/trychai-web-revamped#branch --fullscan
|
|
162
|
+
```
|
|
163
|
+
|
|
164
|
+
**All formats are automatically parsed and normalized to extract the `user/repo_name` format for processing.**
|
|
165
|
+
|
|
166
|
+
### Smart URL Parsing
|
|
167
|
+
|
|
168
|
+
Prismor CLI features intelligent GitHub URL parsing that automatically:
|
|
169
|
+
|
|
170
|
+
- ✅ **Detects and extracts** repository information from any supported format
|
|
171
|
+
- ✅ **Handles edge cases** like trailing slashes, `.git` suffixes, and branch references
|
|
172
|
+
- ✅ **Validates input** to ensure it's a valid GitHub repository
|
|
173
|
+
- ✅ **Provides clear error messages** for unsupported formats
|
|
174
|
+
- ✅ **Supports special characters** in repository names (hyphens, underscores, numbers)
|
|
175
|
+
|
|
176
|
+
**Examples of what gets automatically parsed:**
|
|
177
|
+
```bash
|
|
178
|
+
# All of these resolve to "facebook/react":
|
|
179
|
+
prismor --repo facebook/react --scan
|
|
180
|
+
prismor --repo https://github.com/facebook/react --scan
|
|
181
|
+
prismor --repo git@github.com:facebook/react.git --scan
|
|
182
|
+
prismor --repo github.com/facebook/react --scan
|
|
183
|
+
prismor --repo https://github.com/facebook/react/tree/main --scan
|
|
184
|
+
```
|
|
185
|
+
|
|
186
|
+
### Scan Types
|
|
187
|
+
|
|
188
|
+
#### 1. Vulnerability Scanning (scan)
|
|
189
|
+
|
|
190
|
+
Scan for security vulnerabilities in your dependencies and code:
|
|
191
|
+
|
|
192
|
+
```bash
|
|
193
|
+
prismor --repo myrepository --scan
|
|
194
|
+
```
|
|
195
|
+
|
|
196
|
+
**Note**: Vulnerability scans now run asynchronously for large repositories. The CLI will wait for completion automatically, but you can also use `prismor start-scan` to get a job ID and check status separately.
|
|
197
|
+
|
|
198
|
+
#### 2. Secret Detection
|
|
199
|
+
|
|
200
|
+
Detect exposed secrets, API keys, passwords, and other sensitive information:
|
|
201
|
+
|
|
202
|
+
```bash
|
|
203
|
+
prismor --repo myrepository --detect-secret
|
|
204
|
+
```
|
|
205
|
+
|
|
206
|
+
#### 3. SBOM Generation
|
|
207
|
+
|
|
208
|
+
Generate a Software Bill of Materials for your repository:
|
|
209
|
+
|
|
210
|
+
```bash
|
|
211
|
+
prismor --repo myrepository --sbom
|
|
212
|
+
```
|
|
213
|
+
|
|
214
|
+
#### 4. Full Scan
|
|
215
|
+
|
|
216
|
+
Run all security checks (scan + Secret Detection + SBOM):
|
|
217
|
+
|
|
218
|
+
```bash
|
|
219
|
+
prismor --repo myrepository --fullscan
|
|
220
|
+
```
|
|
221
|
+
|
|
222
|
+
### Multiple Scan Types
|
|
223
|
+
|
|
224
|
+
You can combine multiple scan types:
|
|
225
|
+
|
|
226
|
+
```bash
|
|
227
|
+
prismor --repo myrepository --scan --detect-secret
|
|
228
|
+
```
|
|
229
|
+
|
|
230
|
+
### JSON Output
|
|
231
|
+
|
|
232
|
+
Get results in JSON format for automation and integration:
|
|
233
|
+
|
|
234
|
+
```bash
|
|
235
|
+
prismor --repo myrepository --fullscan --json
|
|
236
|
+
```
|
|
237
|
+
|
|
238
|
+
## Examples
|
|
239
|
+
|
|
240
|
+
### Example 1: Quick Vulnerability Scan (Username/Repo format)
|
|
241
|
+
|
|
242
|
+
```bash
|
|
243
|
+
prismor --repo facebook/react --scan
|
|
244
|
+
```
|
|
245
|
+
|
|
246
|
+
### Example 2: Comprehensive Security Audit (HTTPS URL)
|
|
247
|
+
|
|
248
|
+
```bash
|
|
249
|
+
prismor --repo https://github.com/microsoft/vscode --fullscan
|
|
250
|
+
```
|
|
251
|
+
|
|
252
|
+
### Example 3: Secret Detection with SSH URL
|
|
253
|
+
|
|
254
|
+
```bash
|
|
255
|
+
prismor --repo git@github.com:openai/gpt-3.git --detect-secret
|
|
256
|
+
```
|
|
257
|
+
|
|
258
|
+
### Example 4: SBOM Generation with Bare Domain
|
|
259
|
+
|
|
260
|
+
```bash
|
|
261
|
+
prismor --repo github.com/kubernetes/kubernetes --sbom --json > sbom-results.json
|
|
262
|
+
```
|
|
263
|
+
|
|
264
|
+
### Example 5: Full Scan with Branch Reference
|
|
265
|
+
|
|
266
|
+
```bash
|
|
267
|
+
prismor --repo https://github.com/tensorflow/tensorflow/tree/v2.13.0 --fullscan
|
|
268
|
+
```
|
|
269
|
+
|
|
270
|
+
### Example 6: Multiple Scan Types with Different URL Formats
|
|
271
|
+
|
|
272
|
+
```bash
|
|
273
|
+
# Using HTTPS URL
|
|
274
|
+
prismor --repo https://github.com/pytorch/pytorch --scan --sbom
|
|
275
|
+
|
|
276
|
+
# Using SSH URL
|
|
277
|
+
prismor --repo git@github.com:nodejs/node.git --detect-secret --sbom
|
|
278
|
+
|
|
279
|
+
# Using bare domain
|
|
280
|
+
prismor --repo www.github.com/vercel/next.js --fullscan
|
|
281
|
+
```
|
|
282
|
+
|
|
283
|
+
### Example 7: Save Results to File
|
|
284
|
+
|
|
285
|
+
```bash
|
|
286
|
+
# Save full scan results to JSON file
|
|
287
|
+
prismor --repo username/repo --fullscan --output results.json
|
|
288
|
+
|
|
289
|
+
# Save vulnerability scan with specific branch
|
|
290
|
+
prismor --repo username/repo --scan --branch develop --output vuln-scan.json
|
|
291
|
+
|
|
292
|
+
# Quiet mode with file output (no console output)
|
|
293
|
+
prismor --repo username/repo --sbom --output sbom.json --quiet
|
|
294
|
+
```
|
|
295
|
+
|
|
296
|
+
### Example 8: CI/CD Integration
|
|
297
|
+
|
|
298
|
+
```bash
|
|
299
|
+
# Minimal output for CI/CD pipelines
|
|
300
|
+
prismor --repo $REPO_NAME --scan --quiet --json > scan-results.json
|
|
301
|
+
|
|
302
|
+
# Exit with error code if scan fails
|
|
303
|
+
prismor --repo username/repo --fullscan --quiet || exit 1
|
|
304
|
+
|
|
305
|
+
# Save results and continue pipeline
|
|
306
|
+
prismor --repo username/repo --scan --output scan.json --quiet && \
|
|
307
|
+
echo "Scan completed, results saved to scan.json"
|
|
308
|
+
```
|
|
309
|
+
|
|
310
|
+
### Example 7: Async Scan with Status Checking
|
|
311
|
+
|
|
312
|
+
```bash
|
|
313
|
+
# Start a scan and get job ID
|
|
314
|
+
prismor start-scan username/repo --branch main
|
|
315
|
+
|
|
316
|
+
# Check scan status (use job ID from previous command)
|
|
317
|
+
prismor scan-status <job_id>
|
|
318
|
+
|
|
319
|
+
# Check status with JSON output
|
|
320
|
+
prismor scan-status <job_id> --json
|
|
321
|
+
```
|
|
322
|
+
|
|
323
|
+
## Additional Commands
|
|
324
|
+
|
|
325
|
+
### Start Async Vulnerability Scan
|
|
326
|
+
|
|
327
|
+
Start a vulnerability scan asynchronously and get a job ID for status checking:
|
|
328
|
+
|
|
329
|
+
```bash
|
|
330
|
+
prismor start-scan username/repo
|
|
331
|
+
prismor start-scan username/repo --branch develop
|
|
332
|
+
prismor start-scan username/repo --token ghp_xxxxx
|
|
333
|
+
```
|
|
334
|
+
|
|
335
|
+
**Note**: Requires GitHub token. Set `GITHUB_TOKEN` environment variable or use `--token` option.
|
|
336
|
+
|
|
337
|
+
### Check Scan Status
|
|
338
|
+
|
|
339
|
+
Check the status of a running or completed vulnerability scan:
|
|
340
|
+
|
|
341
|
+
```bash
|
|
342
|
+
prismor scan-status <job_id>
|
|
343
|
+
prismor scan-status <job_id> --json
|
|
344
|
+
```
|
|
345
|
+
|
|
346
|
+
**Status Response Includes**:
|
|
347
|
+
- Job status (running/completed/failed)
|
|
348
|
+
- Repository and branch information
|
|
349
|
+
- Results URLs (public and presigned)
|
|
350
|
+
- Vulnerability summary with severity breakdown
|
|
351
|
+
- Scan date and duration
|
|
352
|
+
|
|
353
|
+
**Example Output**:
|
|
354
|
+
```
|
|
355
|
+
============================================================
|
|
356
|
+
Scan Status
|
|
357
|
+
============================================================
|
|
358
|
+
|
|
359
|
+
Job ID: abc123def456...
|
|
360
|
+
|
|
361
|
+
Status: completed
|
|
362
|
+
|
|
363
|
+
Repository:
|
|
364
|
+
https://github.com/username/repo
|
|
365
|
+
|
|
366
|
+
Branch:
|
|
367
|
+
main
|
|
368
|
+
|
|
369
|
+
Vulnerability Summary:
|
|
370
|
+
Total Vulnerabilities: 15
|
|
371
|
+
Total Targets Scanned: 3
|
|
372
|
+
|
|
373
|
+
Severity Breakdown:
|
|
374
|
+
CRITICAL: 2
|
|
375
|
+
HIGH: 5
|
|
376
|
+
MEDIUM: 6
|
|
377
|
+
LOW: 2
|
|
378
|
+
|
|
379
|
+
Results URL:
|
|
380
|
+
https://prismor-sbom-public-dev.s3.amazonaws.com/...
|
|
381
|
+
```
|
|
382
|
+
|
|
383
|
+
### Check Configuration
|
|
384
|
+
|
|
385
|
+
View your current Prismor CLI configuration:
|
|
386
|
+
|
|
387
|
+
```bash
|
|
388
|
+
prismor config
|
|
389
|
+
```
|
|
390
|
+
|
|
391
|
+
### Version Information
|
|
392
|
+
|
|
393
|
+
Display the version of Prismor CLI:
|
|
394
|
+
|
|
395
|
+
```bash
|
|
396
|
+
prismor version
|
|
397
|
+
```
|
|
398
|
+
|
|
399
|
+
Or:
|
|
400
|
+
|
|
401
|
+
```bash
|
|
402
|
+
prismor --version
|
|
403
|
+
```
|
|
404
|
+
|
|
405
|
+
### Help
|
|
406
|
+
|
|
407
|
+
Get help and see all available options:
|
|
408
|
+
|
|
409
|
+
```bash
|
|
410
|
+
prismor --help
|
|
411
|
+
```
|
|
412
|
+
|
|
413
|
+
## Output
|
|
414
|
+
|
|
415
|
+
Prismor CLI provides clear, colorful output with:
|
|
416
|
+
|
|
417
|
+
- ✓ Success indicators
|
|
418
|
+
- ✗ Error messages
|
|
419
|
+
- ℹ Information updates
|
|
420
|
+
- ⚠ Warnings
|
|
421
|
+
- Detailed scan results including:
|
|
422
|
+
- Repository information
|
|
423
|
+
- Vulnerability counts
|
|
424
|
+
- Secret detection findings
|
|
425
|
+
- SBOM artifact counts
|
|
426
|
+
- Download links for detailed reports
|
|
427
|
+
|
|
428
|
+
## Full Analysis & Dashboarding
|
|
429
|
+
|
|
430
|
+
For comprehensive analysis and visualization of your scan results, visit the **[Prismor Dashboard](https://prismor.dev)**:
|
|
431
|
+
|
|
432
|
+
### Features Available on Prismor.dev:
|
|
433
|
+
- 📊 **Interactive Dashboards** - Visualize security trends and metrics
|
|
434
|
+
- 📈 **Historical Analysis** - Track vulnerabilities over time
|
|
435
|
+
- 🎯 **Detailed Reports** - In-depth analysis of all findings
|
|
436
|
+
- 🔔 **Alerts & Notifications** - Get notified of critical issues
|
|
437
|
+
- 👥 **Team Collaboration** - Share reports with your team
|
|
438
|
+
- 🔄 **CI/CD Integration** - Automate scans in your pipeline
|
|
439
|
+
- 📁 **Repository Management** - Manage multiple repositories in one place
|
|
440
|
+
|
|
441
|
+
### Accessing Full Reports:
|
|
442
|
+
|
|
443
|
+
After running a scan with the CLI, you can:
|
|
444
|
+
|
|
445
|
+
1. Visit [https://prismor.dev](https://prismor.dev)
|
|
446
|
+
2. Log into your dashboard
|
|
447
|
+
3. View all your scan results with rich visualizations
|
|
448
|
+
4. Export reports in various formats
|
|
449
|
+
5. Set up automated scanning schedules
|
|
450
|
+
|
|
451
|
+
The CLI provides quick results in your terminal, while the web dashboard offers comprehensive analysis and long-term security monitoring.
|
|
452
|
+
|
|
453
|
+
## API Information
|
|
454
|
+
|
|
455
|
+
Prismor CLI communicates with the Prismor API at `https://api.prismor.dev`. The CLI handles:
|
|
456
|
+
|
|
457
|
+
- Authentication via API key
|
|
458
|
+
- Request formatting
|
|
459
|
+
- Error handling
|
|
460
|
+
- Response parsing
|
|
461
|
+
- Result presentation
|
|
462
|
+
|
|
463
|
+
## Advanced Usage
|
|
464
|
+
|
|
465
|
+
### Save Results to File
|
|
466
|
+
|
|
467
|
+
Save scan results to a JSON file for later analysis:
|
|
468
|
+
|
|
469
|
+
```bash
|
|
470
|
+
prismor --repo username/repo --fullscan --output results.json
|
|
471
|
+
```
|
|
472
|
+
|
|
473
|
+
### Quiet Mode
|
|
474
|
+
|
|
475
|
+
Run scans with minimal output (useful for CI/CD pipelines):
|
|
476
|
+
|
|
477
|
+
```bash
|
|
478
|
+
prismor --repo username/repo --scan --quiet
|
|
479
|
+
```
|
|
480
|
+
|
|
481
|
+
### Combining Options
|
|
482
|
+
|
|
483
|
+
Combine multiple options for customized workflows:
|
|
484
|
+
|
|
485
|
+
```bash
|
|
486
|
+
# Scan specific branch and save to file
|
|
487
|
+
prismor --repo username/repo --scan --branch develop --output scan-results.json
|
|
488
|
+
|
|
489
|
+
# Quiet mode with JSON output
|
|
490
|
+
prismor --repo username/repo --fullscan --quiet --json
|
|
491
|
+
|
|
492
|
+
# Save results without console output
|
|
493
|
+
prismor --repo username/repo --sbom --output sbom.json --quiet
|
|
494
|
+
```
|
|
495
|
+
|
|
496
|
+
## Troubleshooting
|
|
497
|
+
|
|
498
|
+
### API Key Not Set
|
|
499
|
+
|
|
500
|
+
**Error:**
|
|
501
|
+
```
|
|
502
|
+
✗ PRISMOR_API_KEY environment variable is not set.
|
|
503
|
+
```
|
|
504
|
+
|
|
505
|
+
**Solution:**
|
|
506
|
+
```bash
|
|
507
|
+
# Set temporarily (current session only)
|
|
508
|
+
export PRISMOR_API_KEY=your_api_key_here
|
|
509
|
+
|
|
510
|
+
# Set permanently (add to ~/.bashrc or ~/.zshrc)
|
|
511
|
+
echo 'export PRISMOR_API_KEY=your_api_key_here' >> ~/.zshrc
|
|
512
|
+
source ~/.zshrc
|
|
513
|
+
```
|
|
514
|
+
|
|
515
|
+
**Get your API key:**
|
|
516
|
+
1. Visit [https://prismor.dev/cli](https://prismor.dev/cli)
|
|
517
|
+
2. Sign up for a free account
|
|
518
|
+
3. Generate an API key from your dashboard
|
|
519
|
+
|
|
520
|
+
---
|
|
521
|
+
|
|
522
|
+
### Invalid Repository Format
|
|
523
|
+
|
|
524
|
+
**Error:**
|
|
525
|
+
```
|
|
526
|
+
✗ Unrecognized repository format
|
|
527
|
+
```
|
|
528
|
+
|
|
529
|
+
**Supported formats:**
|
|
530
|
+
- ✅ `username/repository` (recommended)
|
|
531
|
+
- ✅ `https://github.com/username/repository`
|
|
532
|
+
- ✅ `https://www.github.com/username/repository`
|
|
533
|
+
- ✅ `http://github.com/username/repository`
|
|
534
|
+
- ✅ `http://www.github.com/username/repository`
|
|
535
|
+
- ✅ `github.com/username/repository`
|
|
536
|
+
- ✅ `www.github.com/username/repository`
|
|
537
|
+
- ✅ `git@github.com:username/repository.git`
|
|
538
|
+
- ✅ `https://github.com/username/repository/tree/branch`
|
|
539
|
+
- ✅ `https://github.com/username/repository/blob/branch/file`
|
|
540
|
+
|
|
541
|
+
**Not supported:**
|
|
542
|
+
- ❌ Non-GitHub URLs (GitLab, Bitbucket, etc.)
|
|
543
|
+
- ❌ Invalid URL formats
|
|
544
|
+
- ❌ Empty or malformed repository names
|
|
545
|
+
- ❌ Repository names with invalid characters
|
|
546
|
+
|
|
547
|
+
**Valid characters:**
|
|
548
|
+
- Alphanumeric (a-z, A-Z, 0-9)
|
|
549
|
+
- Hyphens (-)
|
|
550
|
+
- Underscores (_)
|
|
551
|
+
- Dots (.)
|
|
552
|
+
- Cannot start or end with special characters
|
|
553
|
+
|
|
554
|
+
---
|
|
555
|
+
|
|
556
|
+
### Connection Issues
|
|
557
|
+
|
|
558
|
+
**Error:**
|
|
559
|
+
```
|
|
560
|
+
✗ Failed to connect to Prismor API
|
|
561
|
+
```
|
|
562
|
+
|
|
563
|
+
**Solutions:**
|
|
564
|
+
|
|
565
|
+
1. **Check Internet Connection**
|
|
566
|
+
```bash
|
|
567
|
+
ping prismor.dev
|
|
568
|
+
```
|
|
569
|
+
|
|
570
|
+
2. **Verify API Endpoint**
|
|
571
|
+
```bash
|
|
572
|
+
curl -I https://prismor.dev
|
|
573
|
+
```
|
|
574
|
+
|
|
575
|
+
3. **Test API Key**
|
|
576
|
+
```bash
|
|
577
|
+
prismor config
|
|
578
|
+
```
|
|
579
|
+
|
|
580
|
+
4. **Check Firewall/Proxy**
|
|
581
|
+
- Ensure your firewall allows HTTPS connections
|
|
582
|
+
- Configure proxy if needed:
|
|
583
|
+
```bash
|
|
584
|
+
export HTTPS_PROXY=http://proxy.example.com:8080
|
|
585
|
+
```
|
|
586
|
+
|
|
587
|
+
5. **Retry with Automatic Retries**
|
|
588
|
+
- The CLI automatically retries failed requests 3 times with exponential backoff
|
|
589
|
+
- If issues persist, check your network configuration
|
|
590
|
+
|
|
591
|
+
---
|
|
592
|
+
|
|
593
|
+
### Timeout Issues
|
|
594
|
+
|
|
595
|
+
**Error:**
|
|
596
|
+
```
|
|
597
|
+
✗ Request timed out
|
|
598
|
+
```
|
|
599
|
+
|
|
600
|
+
**Solutions:**
|
|
601
|
+
|
|
602
|
+
1. **Large Repositories**
|
|
603
|
+
- Vulnerability scans can take up to 10 minutes for large repositories
|
|
604
|
+
- The CLI will wait automatically
|
|
605
|
+
- Use `--quiet` mode to reduce output during long scans
|
|
606
|
+
|
|
607
|
+
2. **Network Latency**
|
|
608
|
+
- Check your internet speed
|
|
609
|
+
- Try again during off-peak hours
|
|
610
|
+
- Consider using a wired connection
|
|
611
|
+
|
|
612
|
+
3. **Check Scan Status**
|
|
613
|
+
```bash
|
|
614
|
+
# Start scan asynchronously
|
|
615
|
+
prismor start-scan username/repo
|
|
616
|
+
|
|
617
|
+
# Check status later
|
|
618
|
+
prismor scan-status <job_id>
|
|
619
|
+
```
|
|
620
|
+
|
|
621
|
+
---
|
|
622
|
+
|
|
623
|
+
### Private Repository Access
|
|
624
|
+
|
|
625
|
+
**Error:**
|
|
626
|
+
```
|
|
627
|
+
✗ GitHub integration required
|
|
628
|
+
```
|
|
629
|
+
|
|
630
|
+
**Solution:**
|
|
631
|
+
1. Visit [https://prismor.dev/dashboard](https://prismor.dev/dashboard)
|
|
632
|
+
2. Navigate to Settings → Integrations
|
|
633
|
+
3. Connect your GitHub account
|
|
634
|
+
4. Authorize Prismor to access private repositories
|
|
635
|
+
5. Try scanning again
|
|
636
|
+
|
|
637
|
+
---
|
|
638
|
+
|
|
639
|
+
### Invalid Characters in Repository Name
|
|
640
|
+
|
|
641
|
+
**Error:**
|
|
642
|
+
```
|
|
643
|
+
✗ Invalid Username: 'user@name'. Must contain only alphanumeric characters...
|
|
644
|
+
```
|
|
645
|
+
|
|
646
|
+
**Solution:**
|
|
647
|
+
- Ensure repository name follows GitHub naming conventions
|
|
648
|
+
- Remove special characters like `@`, `#`, `$`, etc.
|
|
649
|
+
- Valid example: `username/my-repo-name`
|
|
650
|
+
- Invalid example: `user@name/repo#123`
|
|
651
|
+
|
|
652
|
+
---
|
|
653
|
+
|
|
654
|
+
### Rate Limiting
|
|
655
|
+
|
|
656
|
+
**Error:**
|
|
657
|
+
```
|
|
658
|
+
✗ API error: Rate limit exceeded
|
|
659
|
+
```
|
|
660
|
+
|
|
661
|
+
**Solution:**
|
|
662
|
+
1. Wait a few minutes before retrying
|
|
663
|
+
2. Check your account limits at [prismor.dev/dashboard](https://prismor.dev/dashboard)
|
|
664
|
+
3. Upgrade your plan if needed for higher limits
|
|
665
|
+
|
|
666
|
+
---
|
|
667
|
+
|
|
668
|
+
### Getting Help
|
|
669
|
+
|
|
670
|
+
If you're still experiencing issues:
|
|
671
|
+
|
|
672
|
+
1. **Check Configuration**
|
|
673
|
+
```bash
|
|
674
|
+
prismor config
|
|
675
|
+
```
|
|
676
|
+
|
|
677
|
+
2. **View Account Status**
|
|
678
|
+
```bash
|
|
679
|
+
prismor status
|
|
680
|
+
```
|
|
681
|
+
|
|
682
|
+
3. **Enable Verbose Output**
|
|
683
|
+
- Remove `--quiet` flag to see detailed error messages
|
|
684
|
+
|
|
685
|
+
4. **Contact Support**
|
|
686
|
+
- Visit [https://prismor.dev](https://prismor.dev)
|
|
687
|
+
- Check documentation at [https://docs.prismor.dev](https://docs.prismor.dev)
|
|
688
|
+
- Report issues at [GitHub Issues](https://github.com/PrismorSec/prismor-cli/issues)
|
|
689
|
+
|
|
690
|
+
## Development
|
|
691
|
+
|
|
692
|
+
### Local Installation
|
|
693
|
+
|
|
694
|
+
For development, clone the repository and install in editable mode:
|
|
695
|
+
|
|
696
|
+
```bash
|
|
697
|
+
git clone https://github.com/PrismorSec/prismor-cli.git
|
|
698
|
+
cd prismor-cli
|
|
699
|
+
pip install -e .
|
|
700
|
+
```
|
|
701
|
+
|
|
702
|
+
### Project Structure
|
|
703
|
+
|
|
704
|
+
```
|
|
705
|
+
prismor-cli/
|
|
706
|
+
├── prismor/
|
|
707
|
+
│ ├── __init__.py # Package initialization
|
|
708
|
+
│ ├── cli.py # CLI interface and commands
|
|
709
|
+
│ └── api.py # API client and communication
|
|
710
|
+
├── setup.py # Package configuration
|
|
711
|
+
├── requirements.txt # Dependencies
|
|
712
|
+
└── README.md # Documentation
|
|
713
|
+
```
|
|
714
|
+
|
|
715
|
+
## Requirements
|
|
716
|
+
|
|
717
|
+
- Python 3.7 or higher
|
|
718
|
+
- `click` >= 8.0.0
|
|
719
|
+
- `requests` >= 2.25.0
|
|
720
|
+
|
|
721
|
+
## License
|
|
722
|
+
|
|
723
|
+
MIT License - See LICENSE file for details
|
|
724
|
+
|
|
725
|
+
## Support
|
|
726
|
+
|
|
727
|
+
- **Website**: [https://prismor.dev](https://prismor.dev)
|
|
728
|
+
- **Dashboard**: [https://prismor.dev](https://prismor.dev) (Sign up for full features)
|
|
729
|
+
- **Documentation**: [https://docs.prismor.dev](https://docs.prismor.dev)
|
|
730
|
+
- **Issues**: [https://github.com/PrismorSec/prismor-cli/issues](https://github.com/prismor/prismor-cli/issues)
|
|
731
|
+
|
|
732
|
+
### Need Help?
|
|
733
|
+
|
|
734
|
+
1. Visit [Prismor.dev](https://prismor.dev) for full documentation and support
|
|
735
|
+
2. Check the dashboard for detailed scan results and analysis
|
|
736
|
+
3. Join our community for questions and discussions
|
|
737
|
+
|
|
738
|
+
## Contributing
|
|
739
|
+
|
|
740
|
+
Contributions are welcome! Please feel free to submit a Pull Request.
|
|
741
|
+
|
|
742
|
+
---
|
|
743
|
+
|
|
744
|
+
Made with ❤️ by Prismor
|