scan Commands
Security scanning and evidence collection for audit compliance.
Commands in this Category
| Command | Purpose |
|---|---|
| scan | Run all security scans |
| scan vuln | Scan for vulnerabilities using Trivy |
| scan sast | Static Application Security Testing using Semgrep |
| scan secrets | Detect secrets and credentials |
| scan iac | Scan Infrastructure as Code for misconfigurations |
| scan sbom | Generate Software Bill of Materials |
| scan compliance | Check compliance with security standards |
| scan zap | Dynamic Application Security Testing using OWASP ZAP |
Quick Examples
# Run all security scans
r2r eac scan
# Scan for vulnerabilities
r2r eac scan vuln
# Detect secrets
r2r eac scan secrets
See Also
Tutorials | How-to Guides | Explanation | Reference
You are here: Reference — information-oriented technical descriptions of the system.