Created and maintained by https://safedep.io with contributions from the community 🚀
vet is a tool for protecting against open source software supply chain attacks. To adapt to organizational needs, it uses an opinionated policy expressed as Common Expressions Language and extensive package security metadata including
vet is integrated with SafeDep Cloud for real time protection against malicious open source packages through active code scanning and analysis. vet-action seamlessly integrates vet in GitHub Action for proactive guardrails against malicious code from open sources.
vet is built for users who intend to enforce guardrails against open source supply chain attacks using their opinionated policies. Security guardrails can be built by expressing policies as CEL which vet enforces in CI/CD.
vet using homebrew in MacOS and Linuxbrew tap safedep/tap
brew install safedep/tap/vet
Other Installation Options
Download the binary file for your operating system / architecture from the Official GitHub Releases
Build from source
Ensure $(go env GOPATH)/bin is in your $PATH
go install github.com/safedep/vet@latest
docker run --rm -it ghcr.io/safedep/vet:latest version
Note: Container image is built for x86_64 Linux only. Use a pre-built binary or build from source for other platforms.
vet to identify open source risks by scanning your codebasevet scan -D /path/to/repository
vet scan -M /path/to/pom.xml
vet scan -M /path/to/requirements.txt
vet scan -M /path/to/package-lock.json
Note: --lockfiles is generalized to -M or --manifests to support additional types of package manifests or other artifacts in future.
vet scan -M /path/to/app.jar
Suitable for scanning bootable JARs with embedded dependencies
vet scan -D /path/to/jars --type jar
Scanning Python Wheels
vet scan -M /path/to/app.whl
Suitable for scanning Python wheels with embedded dependencies
vet scan -M /path/to/cyclonedx-sbom.json --type bom-cyclonedx
Note: --type is a generalized version of --lockfile-as to support additional artifact types in future.
vet scan -M /path/to/spdx-sbom.json --type bom-spdx
Note: SBOM scanning feature is currently in experimental stage
vet connect github
Alternatively, set GITHUB_TOKEN environment variable with Github PAT
vet scan --github https://github.com/safedep/vet
Note: You may need to enable Dependency Graph at repository or organization level for Github repository scanning to work.
You must setup the required access for scanning private repositories before scanning organizations
vet scan --github-org https://github.com/safedep
Note:
vetwill block and wait if it encounters Github secondary rate limit.
vet scan --purl pkg:/gem/nokogiri@1.10.4
List supported package manifest parsers
vet scan parsers --experimental
vet uses Common Expressions Language (CEL) as the policy language. Policies can be defined to build guardrails preventing introduction of insecure components.
vet and fail if a critical or high vulnerability was detectedvet scan -D /path/to/code \
--filter 'vulns.critical.exists(p, true) || vulns.high.exists(p, true)' \
--filter-fail
License
vet and fail if a package with a specific license was detectedvet scan -D /path/to/code \
--filter 'licenses.exists(p, "GPL-2.0")' \
--filter-fail
Note: Using licenses.contains_license(...) is recommended for license matching due to its support for SPDX expressions.
vet supports SPDX License Expressions at package license and policy levelvet scan -D /path/to/code \
--filter 'licenses.contains_license("LGPL-2.1+")' \
--filter-fail
Scorecard
Run vet and fail based on OpenSSF Scorecard attributes
vet scan -D /path/to/code \
--filter 'scorecard.scores.Maintained == 0' \
--filter-fail
For more examples, refer to documentation
Query mode helps querying the data gathered by vet multiple times without running the scan again.
vet scan -D /path/to/code --json-dump-dir /path/to/dump
Filter results using query command
vet query --from /path/to/dump \
--filter 'vulns.critical.exists(p, true) || vulns.high.exists(p, true)'
Generate report from dumped data
vet query --from /path/to/dump --report-json /path/to/report.json
vet supports generating reports in multiple formats during scan or query execution.
| Format | Description |
|---|---|
| Markdown | Human readable report for vulnerabilities, licenses, and more |
| CSV | Export data to CSV format for manual slicing and dicing |
| JSON | Machine readable JSON format following internal schema (maximum data) |
| SARIF | Useful for integration with Github Code Scanning and other tools |
| Graph | Dependency graph in DOT format for risk and package relationship visualization |
| CycloneDX | Software Bill of Materials (SBOM) in CycloneDX format |
| Summary | Default console report with summary of vulnerabilities, licenses, and more |
vet is available as a GitHub Action, refer to vet-actionvet can be integrated with GitLab CI, refer to vet CI Componentvet supports scanning for malicious packages using SafeDep Cloud API which requires an API key.
vet cloud quickstart
vet scan -D /path/to/code --malware
Note: vet will submit identified packages to SafeDep Cloud for analysis and wait for a timeout period for response. Not all package analysis may be completed within the timeout period. However, subsequent scans will fetch the results if available and lead to increased coverage over time. Adjust the timeout using --malware-analysis-timeout flag.
vet scan --vsx --malware
Scanning GitHub Actions
inspect commandvet inspect malware --purl pkg:github/safedep/vet-action@v1
vet scan -D .github/workflows --malware
vet inspect malware --purl pkg:github/safedep/vet@v1.9.5
Note: vet will resolve the commit hash for the given version and use it for malware analysis. This is because GitHub repository tags are mutable and can be changed.
If active analysis is not enabled using vet scan --malware flag, vet will fallback to query known malicious packages data from community instance of Malysis service.
Try out the interactive tutorial to get started with vet
Refer to https://safedep.io/docs for the detailed documentation
vet collects anonymous telemetry to help us understand how it is used and improve the product. To disable telemetry, set VET_DISABLE_TELEMETRY environment variable to true.
export VET_DISABLE_TELEMETRY=true
First of all, thank you so much for showing interest in vet, we appreciate it ❤️
Refer to CONTRIBUTING.md
SafeDep provides enterprise support for vet deployments. Check out SafeDep Cloud for large scale deployment and management of vet in your organization.
