Skip to content

scan Commands

Security scanning and evidence collection for audit compliance.

Commands in this Category

Command Purpose
scan Run all security scans
scan vuln Scan for vulnerabilities using Trivy
scan sast Static Application Security Testing using Semgrep
scan secrets Detect secrets and credentials
scan iac Scan Infrastructure as Code for misconfigurations
scan sbom Generate Software Bill of Materials
scan compliance Check compliance with security standards
scan zap Dynamic Application Security Testing using OWASP ZAP

Quick Examples

# Run all security scans
r2r eac scan

# Scan for vulnerabilities
r2r eac scan vuln

# Detect secrets
r2r eac scan secrets

See Also


Tutorials | How-to Guides | Explanation | Reference

You are here: Reference — information-oriented technical descriptions of the system.