scan Commands
Overview
The scan category contains 8 commands for security scanning and evidence collection for audit compliance.
Commands
| Command | Purpose |
|---|---|
| scan | Run all security scans |
| scan vuln | Scan for vulnerabilities using Trivy |
| scan sast | Static Application Security Testing using Semgrep |
| scan secrets | Detect secrets and credentials using Trivy |
| scan iac | Scan Infrastructure as Code for misconfigurations |
| scan sbom | Generate Software Bill of Materials |
| scan compliance | Check compliance with security standards |
| scan zap | Dynamic Application Security Testing using OWASP ZAP |
Common Use Cases
Complete Security Scan
Vulnerability Assessment
Compliance Checking
Application Security Testing
Key Features
- Multi-tool security scanning (Trivy, Semgrep, OWASP ZAP)
- SBOM generation for supply chain security
- Compliance validation (CIS, NIST)
- Secret detection
- Infrastructure as Code scanning
- Static and dynamic analysis
See Also
Tutorials | How-to Guides | Explanation | Reference
You are here: Reference — information-oriented technical descriptions of the system.