Skip to content

Commit 982e3aa

Browse files
authored
Merge pull request #218 from sonukapoor/docs/issue-214-usage-docs
docs: update site and readme for usage-aware scanning
2 parents 2075ea4 + 376a6ee commit 982e3aa

4 files changed

Lines changed: 22 additions & 9 deletions

File tree

README.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@
1010
<img src="https://raw.githubusercontent.com/sonukapoor/cve-lite-cli/main/assets/logo-with-title.png" alt="CVE Lite CLI" width="320"/>
1111

1212
<h1>CVE Lite CLI</h1>
13-
<p>Fast, developer-friendly vulnerability scanning for JavaScript and TypeScript projects.<br/>Practical fix guidance. Offline support. Clear direct vs transitive visibility.</p>
13+
<p>Fast, developer-friendly vulnerability scanning for JavaScript and TypeScript projects.<br/>Practical fix guidance. Offline support. Usage-aware reachability. Clear direct vs transitive visibility.</p>
1414

1515
<strong>Scan. Understand. Fix.</strong>
1616

@@ -60,6 +60,7 @@ It is built for the moment right before release: fast, local-first, and honest a
6060
**Key differentiators:**
6161

6262
- **Copy-and-run fix commands** — turns findings into package-manager-aware `npm install`, `pnpm add`, `yarn add`, or `bun add` commands you can run immediately
63+
- **Usage-aware reachability scanning** — uses static analysis to detect if vulnerable packages are actually imported in your code, cutting alert fatigue with `--usage` and `--only-used`
6364
- **Direct vs transitive visibility** — shows whether the risk comes from something you installed directly or a nested dependency
6465
- **Offline advisory DB** — sync advisory data ahead of time and scan with zero runtime API calls, useful for enterprise and restricted-network environments
6566
- **No account required** — no sign-up, no cloud dashboard, no source code upload
@@ -72,7 +73,8 @@ It is built for the moment right before release: fast, local-first, and honest a
7273
| JS/TS lockfile scanning ||||||
7374
| npm + pnpm + Yarn + Bun support ||||||
7475
| No account required ||||||
75-
| **Free to use** ||||||
76+
| Free to use ||||||
77+
| Usage-aware reachability scanning ||||| ⚠️ |
7678
| Direct vs transitive visibility || ⚠️ ||||
7779
| Copy-and-run fix commands ||||| ⚠️ |
7880
| Suggested remediation plan ||| ⚠️ || ⚠️ |
@@ -159,6 +161,10 @@ cve-lite /path/to/project --osv-url https://security.company.internal/osv
159161
cve-lite --version
160162
```
161163

164+
### Why is `--usage` an opt-in flag?
165+
166+
CVE Lite CLI is designed to be blazing fast. Scanning a lockfile is nearly instantaneous, whereas running static reachability analysis across thousands of source files takes significantly more time. Furthermore, static analysis can occasionally produce false negatives (e.g., if a package is used in a build script or dynamically imported at runtime). Making `--usage` opt-in ensures the default lockfile scan remains instant and strictly reflects your dependency graph, while giving you the option to aggressively filter out unreachable noise when triaging findings.
167+
162168
## Auto-fix mode (`--fix`)
163169

164170
`--fix` applies validated direct dependency fixes using your project's package manager, then rescans automatically.

docs/comparison.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ CVE Lite CLI is not trying to be everything for everyone. It is designed to be o
2222
| npm + pnpm + Yarn support ||||||
2323
| Local-first workflow ||||||
2424
| No account required ||||||
25+
| Usage-aware reachability scanning ||||| ⚠️ |
2526
| Direct vs transitive visibility || ⚠️ ||||
2627
| Clear top-priority fix guidance ||||| ⚠️ |
2728
| Suggested remediation plan ||| ⚠️ || ⚠️ |

docs/how-to-read-verbose-output.md

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -51,9 +51,10 @@ The suggested fix plan gives a remediation sequence so teams can execute in orde
5151

5252
How to interpret:
5353

54+
- `Usage`: how many source files import the vulnerable dependency (requires `--usage` flag)
5455
- `Versions scanned`: candidate versions checked above current
5556
- `Still known vulnerable`: versions rejected because they remained vulnerable
56-
- `Recommended target`: selected upgrade target from the evaluated set
57+
- `Breaking?`: flagged with a `` if the recommended target is a major version bump and may introduce breaking changes
5758

5859
What this means:
5960

@@ -68,8 +69,8 @@ The main findings table is your full inventory of affected packages, severity, r
6869
How to use this section:
6970

7071
- read `Package` and `Current` to understand what you control
71-
- use `Recommended target` as the next parent upgrade candidate
72-
- use `Context` to see which vulnerable dependency that upgrade addresses
72+
- use `Usage` to quickly identify if the dependency is actually imported or just noise
73+
- use `Fixed` to see what the safe target version is
7374

7475
## 5) Confirm dependency paths and parent upgrades
7576

docs/index.html

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@
109109
<p class="eyebrow">JavaScript/TypeScript Dependency Scanner</p>
110110
<h1>Scan. Understand. Fix.</h1>
111111
<p>
112-
CVE Lite CLI gives you a fast, local-first vulnerability scan with practical remediation commands, direct vs
112+
CVE Lite CLI gives you a fast, local-first vulnerability scan with practical remediation commands, usage-aware reachability analysis, direct vs
113113
transitive
114114
clarity, and offline advisory DB support for restricted environments, so dependency fixes happen in minutes
115115
instead of
@@ -123,6 +123,7 @@ <h1>Scan. Understand. Fix.</h1>
123123
<ul class="stats">
124124
<li>No account required</li>
125125
<li>npm, pnpm, Yarn, and Bun lockfile support</li>
126+
<li>Usage-aware reachability scanning</li>
126127
<li>Offline scans with local advisory DB</li>
127128
<li>Copy-and-run direct fix commands</li>
128129
<li>Conservative auto-remediation with `--fix`</li>
@@ -191,9 +192,13 @@ <h3>Run one-off with npx</h3>
191192
</section>
192193

193194
<section class="container" id="features">
194-
<h2>What Makes It Useful</h2>
195-
<div class="grid three">
196-
<article class="card" id="fix-mode">
195+
<h2>What Makes It Useful</h2>
196+
<div class="grid three">
197+
<article class="card" id="reachability">
198+
<h3>Usage-aware reachability</h3>
199+
<p>Cut alert fatigue instantly. The `--usage` scanner statically analyzes your source code to detect if vulnerable packages are actually imported, and `--only-used` aggressively filters out the rest.</p>
200+
</article>
201+
<article class="card" id="fix-mode">
197202
<h3>Conservative `--fix` mode</h3>
198203
<p>Apply validated direct dependency fixes automatically, then rescan immediately with a concise before/after
199204
summary.</p>

0 commit comments

Comments
 (0)