Snyk
Developer security platform for finding and fixing vulnerabilities. Scan code, dependencies, containers, and IaC configs.
54 commands
Browse by Topic
Install Snyk CLI
Install Snyk security scanner globally using npm
Authenticate Snyk CLI
Authenticate the Snyk CLI with your account via the browser
Check Snyk version
Verify Snyk is installed and display the current version
Test project
Test current project for vulnerabilities.
Test with severity threshold
Only report high+ severity issues.
Test specific file
Test specific manifest file.
JSON output
Output results as JSON.
Test all projects
Test all projects in directory.
Test for specific org
Run test against a specific Snyk organization.
Include dev dependencies
Include devDependencies in the scan.
Prune repeated subdeps
Remove duplicate sub-dependencies for cleaner results.
Custom policy path
Use a custom .snyk policy file path.
Set detection depth
Limit how deep to search for manifest files.
Fail on fixable only
Only fail if there are upgradable vulnerabilities.
SARIF output
Output results in SARIF format for CI integration.
Monitor project
Take snapshot for continuous monitoring.
Monitor with project name
Monitor with custom project name.
Monitor with tags
Add tags for filtering.
Monitor for specific org
Send monitor snapshot to a specific organization.
Monitor with remote repo URL
Associate snapshot with a remote repository.
Monitor with target reference
Tag the snapshot with a branch or version reference.
Monitor all projects
Monitor all detected projects in a directory.
Test container image
Scan container image for vulnerabilities.
Test with Dockerfile
Include Dockerfile for fix suggestions.
Monitor container
Continuously monitor container image.
Exclude base image
Only show app-level vulnerabilities.
Include app vulns
Scan application dependencies inside the image.
Scan nested JARs
Scan nested JAR files inside the image.
Specify platform
Test a specific platform for multi-arch images.
Generate container SBOM
Generate a software bill of materials for an image.
Test IaC files
Scan IaC files for misconfigurations.
Test specific file
Test specific Terraform file.
Test with rules
Apply custom IaC rules.
SARIF output
Output in SARIF format.
Scan Terraform plan
Scan planned Terraform values for issues.
IaC report to Snyk
Send IaC scan results to Snyk dashboard.
Detect IaC drift
Detect unmanaged cloud resources (drift detection).
Describe cloud resources
Compare cloud state with Terraform state for drift.
Test code
Run static code analysis (SAST).
Test specific path
Scan specific directory.
JSON output
Output code findings as JSON.
SARIF output
Output in SARIF for GitHub integration.
Code severity threshold
Only report high or critical code issues.
Exclude paths
Exclude directories from code analysis.
Auto-fix vulnerabilities
Automatically apply available fixes to dependencies.
Ignore a vulnerability
Ignore a specific vulnerability by ID with a reason.
Ignore with expiry
Temporarily ignore a vulnerability until a date.
Authenticate Snyk CLI
Authenticate via browser to connect CLI to your account.
Auth with token
Authenticate with an API token for CI/CD.
Set config value
Set a Snyk CLI configuration value.
Get config value
Read a Snyk CLI configuration value.
Clear config
Remove all Snyk CLI configuration.
Set default org
Set the default organization for all commands.
Generate project SBOM
Generate a software bill of materials for the project.
Discussion
Loading comments...