|
1 | 1 |
|
| 2 | +[](https://owasp.org/cve-lite-cli) |
2 | 3 | [](https://www.npmjs.com/package/cve-lite-cli) |
3 | 4 | [](https://www.npmjs.com/package/cve-lite-cli) |
4 | | -[](https://github.com/sonukapoor/cve-lite-cli/actions) |
| 5 | +[](https://github.com/OWASP/cve-lite-cli/actions) |
5 | 6 | [](https://github.com/marketplace/actions/cve-lite-cli) |
6 | | -[](https://github.com/sonukapoor/cve-lite-cli/blob/main/LICENSE) |
7 | | -[](https://github.com/sonukapoor/cve-lite-cli) |
| 7 | +[](https://github.com/OWASP/cve-lite-cli/blob/main/LICENSE) |
| 8 | +[](https://github.com/OWASP/cve-lite-cli) |
8 | 9 |
|
9 | 10 | <div align="center"> |
10 | | - <img src="https://raw.githubusercontent.com/sonukapoor/cve-lite-cli/main/assets/logo-with-title.png" alt="CVE Lite CLI" width="320"/> |
| 11 | + <img src="https://raw.githubusercontent.com/OWASP/cve-lite-cli/main/assets/logo-with-title.png" alt="CVE Lite CLI" width="320"/> |
11 | 12 |
|
12 | 13 | <h1>CVE Lite CLI</h1> |
| 14 | + |
| 15 | + **🏆 Officially recognized as an [OWASP Incubator Project](https://owasp.org/cve-lite-cli)** |
| 16 | + |
13 | 17 | <p>Fast, developer-friendly vulnerability scanning for JavaScript and TypeScript projects.<br/>Practical fix guidance. Offline support. Usage-aware reachability. Clear direct vs transitive visibility.</p> |
14 | 18 |
|
15 | 19 | <strong>Scan. Understand. Fix.</strong> |
|
30 | 34 | <a href="#quick-start">Quick Start</a> • |
31 | 35 | <a href="#usage">Usage</a> • |
32 | 36 | <a href="#what-it-looks-like">Screenshots</a> • |
| 37 | + <a href="docs/html-report.md">HTML Report</a> • |
33 | 38 | <a href="docs/comparison.md">Compare</a> • |
34 | 39 | <a href="docs/roadmap.md">Roadmap</a> • |
35 | | - <a href="https://github.com/sonukapoor/cve-lite-cli/blob/main/src/docs/CONTRIBUTING.md">Contributing</a> |
| 40 | + <a href="https://github.com/OWASP/cve-lite-cli/blob/main/src/docs/CONTRIBUTING.md">Contributing</a> |
36 | 41 | </p> |
37 | 42 | </div> |
38 | 43 |
|
@@ -96,22 +101,39 @@ cve-lite . |
96 | 101 | ``` |
97 | 102 |
|
98 | 103 | <p align="center"> |
99 | | - <a href="https://raw.githubusercontent.com/sonukapoor/cve-lite-cli/main/assets/default-output.png"> |
100 | | - <img src="https://raw.githubusercontent.com/sonukapoor/cve-lite-cli/main/assets/default-output.png" alt="CVE Lite CLI default output" width="600"/> |
| 104 | + <a href="https://raw.githubusercontent.com/OWASP/cve-lite-cli/main/assets/default-output.png"> |
| 105 | + <img src="https://raw.githubusercontent.com/OWASP/cve-lite-cli/main/assets/default-output.png" alt="CVE Lite CLI default output" width="600"/> |
101 | 106 | </a> |
102 | 107 | </p> |
103 | 108 |
|
104 | 109 | Verbose output — includes the `Copy And Run These Fix Commands` section: |
105 | 110 |
|
106 | 111 | <p align="center"> |
107 | | - <a href="https://raw.githubusercontent.com/sonukapoor/cve-lite-cli/main/assets/verbose-output-1.png"><img src="https://raw.githubusercontent.com/sonukapoor/cve-lite-cli/main/assets/verbose-output-1.png" alt="Verbose output part 1" width="280"/></a> |
108 | | - <a href="https://raw.githubusercontent.com/sonukapoor/cve-lite-cli/main/assets/verbose-output-2.png"><img src="https://raw.githubusercontent.com/sonukapoor/cve-lite-cli/main/assets/verbose-output-2.png" alt="Verbose output part 2" width="280"/></a> |
109 | | - <a href="https://raw.githubusercontent.com/sonukapoor/cve-lite-cli/main/assets/verbose-output-3.png"><img src="https://raw.githubusercontent.com/sonukapoor/cve-lite-cli/main/assets/verbose-output-3.png" alt="Verbose output part 3" width="280"/></a> |
| 112 | + <a href="https://raw.githubusercontent.com/OWASP/cve-lite-cli/main/assets/verbose-output-1.png"><img src="https://raw.githubusercontent.com/OWASP/cve-lite-cli/main/assets/verbose-output-1.png" alt="Verbose output part 1" width="280"/></a> |
| 113 | + <a href="https://raw.githubusercontent.com/OWASP/cve-lite-cli/main/assets/verbose-output-2.png"><img src="https://raw.githubusercontent.com/OWASP/cve-lite-cli/main/assets/verbose-output-2.png" alt="Verbose output part 2" width="280"/></a> |
| 114 | + <a href="https://raw.githubusercontent.com/OWASP/cve-lite-cli/main/assets/verbose-output-3.png"><img src="https://raw.githubusercontent.com/OWASP/cve-lite-cli/main/assets/verbose-output-3.png" alt="Verbose output part 3" width="280"/></a> |
110 | 115 | </p> |
111 | 116 | <p align="center"><sub>Click any screenshot to enlarge</sub></p> |
112 | 117 |
|
113 | 118 | For a section-by-section walkthrough, see [How to read verbose output](docs/how-to-read-verbose-output.md). |
114 | 119 |
|
| 120 | +## HTML vulnerability report (`--report`) |
| 121 | + |
| 122 | +Generate a self-contained HTML dashboard from any scan — severity cards, an interactive findings table, and copy-ready fix commands, all written to a local directory and opened automatically in your browser. |
| 123 | + |
| 124 | +```bash |
| 125 | +cve-lite /path/to/project --report |
| 126 | +cve-lite /path/to/project --report ./my-report --no-open |
| 127 | +``` |
| 128 | + |
| 129 | +<p align="center"> |
| 130 | + <a href="https://raw.githubusercontent.com/OWASP/cve-lite-cli/main/assets/html-report-dashboard.png"> |
| 131 | + <img src="https://raw.githubusercontent.com/OWASP/cve-lite-cli/main/assets/html-report-dashboard.png" alt="CVE Lite CLI HTML Report Dashboard" width="700"/> |
| 132 | + </a> |
| 133 | +</p> |
| 134 | + |
| 135 | +See the [HTML Report guide](docs/html-report.md) for the full option reference and output details. |
| 136 | + |
115 | 137 | ## Usage |
116 | 138 |
|
117 | 139 | ```bash |
@@ -139,6 +161,10 @@ cve-lite /path/to/project --fail-on high |
139 | 161 | # JSON output |
140 | 162 | cve-lite /path/to/project --json |
141 | 163 |
|
| 164 | +# Generate an HTML vulnerability dashboard (opens in browser automatically) |
| 165 | +cve-lite /path/to/project --report |
| 166 | +cve-lite /path/to/project --report ./my-report --no-open |
| 167 | + |
142 | 168 | # Scan project source files to check if vulnerable dependencies are actually imported |
143 | 169 | cve-lite /path/to/project --usage |
144 | 170 |
|
@@ -202,27 +228,37 @@ See the [Offline Advisory DB guide](docs/offline-advisory-db.md) for the full wo |
202 | 228 | The project ships a first-party [GitHub Action on the Marketplace](https://github.com/marketplace/actions/cve-lite-cli): |
203 | 229 |
|
204 | 230 | ```yaml |
205 | | -- uses: sonukapoor/cve-lite-cli@v1 |
| 231 | +- uses: OWASP/cve-lite-cli@v1 |
206 | 232 | with: |
207 | 233 | verbose: "true" |
208 | 234 | fail-on: high |
209 | 235 | ``` |
210 | 236 |
|
211 | | -CVE Lite CLI also uses itself in CI to scan its own dependencies. See [`self-scan.yml`](https://github.com/sonukapoor/cve-lite-cli/blob/main/.github/workflows/self-scan.yml). |
| 237 | +CVE Lite CLI also uses itself in CI to scan its own dependencies. See [`self-scan.yml`](https://github.com/OWASP/cve-lite-cli/blob/main/.github/workflows/self-scan.yml). |
212 | 238 |
|
213 | 239 | For full CI patterns including offline workflows, git hooks, and scripted automation, see the [CI and Workflow Integration guide](docs/ci-integration.md). |
214 | 240 |
|
215 | | -## Relationship to similar OWASP projects |
| 241 | +## OWASP project |
| 242 | + |
| 243 | +CVE Lite CLI is an [OWASP Incubator Project](https://owasp.org/cve-lite-cli), peer-reviewed and maintained under the Open Web Application Security Project Foundation. Being part of OWASP means: |
| 244 | + |
| 245 | +- **Peer-reviewed** by security professionals |
| 246 | +- **Community-driven** development and governance |
| 247 | +- **Vendor-neutral** with no commercial platform required |
| 248 | +- **Open source** with transparent security practices and a minimal dependency footprint |
216 | 249 |
|
217 | | -CVE Lite CLI is intentionally narrower than the broader OWASP security tooling ecosystem. Its role is workflow-focused: fast local checks and simple CI release gates for JavaScript and TypeScript dependency scanning. |
| 250 | +**Where it fits in the OWASP ecosystem:** |
218 | 251 |
|
219 | | -The closest OWASP comparisons are: |
| 252 | +CVE Lite CLI fills a specific gap — fast, local-first JS/TS dependency scanning close to release time — that broader OWASP tools are not optimized for: |
220 | 253 |
|
221 | | -- **OWASP Dependency-Check** — broader ecosystem coverage, different operational model |
222 | | -- **OWASP dep-scan** — wider language and environment coverage |
223 | | -- **OWASP Dependency-Track** — SBOM- and platform-oriented, not a local developer CLI |
| 254 | +| Tool | Focus | |
| 255 | +|---|---| |
| 256 | +| CVE Lite CLI | Lockfile-first, local developer CLI, remediation-focused, JS/TS | |
| 257 | +| OWASP Dependency-Check | Multi-language, SAST-style, broader ecosystem | |
| 258 | +| OWASP dep-scan | Multi-language and environment, SBOM and cloud-native | |
| 259 | +| OWASP Dependency-Track | Platform and SBOM management, not a local CLI | |
224 | 260 |
|
225 | | -CVE Lite CLI complements these tools by serving a practical developer workflow close to release time: lockfile-first, local-first, remediation-focused, and offline-capable. It is vendor-neutral and does not require any commercial platform. |
| 261 | +CVE Lite CLI complements these tools. It is not a replacement for continuous monitoring or full SBOM management — it is the fast local check you run before pushing. |
226 | 262 |
|
227 | 263 | ## Real-world case studies |
228 | 264 |
|
@@ -278,27 +314,27 @@ See [parser-coverage.md](docs/parser-coverage.md) for supported lockfile formats |
278 | 314 |
|
279 | 315 | Feedback on output clarity, remediation guidance, ecosystem coverage, and CI usage is especially valuable. |
280 | 316 |
|
281 | | -See [CONTRIBUTING.md](https://github.com/sonukapoor/cve-lite-cli/blob/main/src/docs/CONTRIBUTING.md) to get started. |
| 317 | +See [CONTRIBUTING.md](https://github.com/OWASP/cve-lite-cli/blob/main/src/docs/CONTRIBUTING.md) to get started. |
282 | 318 |
|
283 | 319 | ## Add a badge to your project |
284 | 320 |
|
285 | 321 | If you use CVE Lite CLI in your project, add this badge to your README: |
286 | 322 |
|
287 | 323 | ```markdown |
288 | | -[](https://github.com/sonukapoor/cve-lite-cli) |
| 324 | +[](https://github.com/OWASP/cve-lite-cli) |
289 | 325 | ``` |
290 | 326 |
|
291 | | -[](https://github.com/sonukapoor/cve-lite-cli) |
| 327 | +[](https://github.com/OWASP/cve-lite-cli) |
292 | 328 |
|
293 | 329 | ## Community and support |
294 | 330 |
|
295 | | -For bug reports and feature requests: [GitHub Issues](https://github.com/sonukapoor/cve-lite-cli/issues) |
| 331 | +For bug reports and feature requests: [GitHub Issues](https://github.com/OWASP/cve-lite-cli/issues) |
296 | 332 |
|
297 | 333 | Helpful feedback includes reproducible bug reports, real-world lockfile edge cases, ideas for clearer output and remediation guidance, and CI or JSON workflow examples. |
298 | 334 |
|
299 | | -For security-related reporting: [SECURITY.md](https://github.com/sonukapoor/cve-lite-cli/blob/main/src/docs/SECURITY.md) |
| 335 | +For security-related reporting: [SECURITY.md](https://github.com/OWASP/cve-lite-cli/blob/main/src/docs/SECURITY.md) |
300 | 336 |
|
301 | | -If CVE Lite CLI helps your release workflow, a [GitHub star](https://github.com/sonukapoor/cve-lite-cli) helps more developers find it. |
| 337 | +If CVE Lite CLI helps your release workflow, a [GitHub star](https://github.com/OWASP/cve-lite-cli) helps more developers find it. |
302 | 338 |
|
303 | 339 | ## License |
304 | 340 |
|
|
0 commit comments