npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2024 – Pkg Stats / Ryan Hefner

@soos-io/soos-sca

v2.0.27

Published

SOOS Security Analysis CI - Check for vulnerabilities, policy violations and more!

Downloads

7,181

Readme

SOOS Core SCA

SOOS is an independent software security company, located in Winooski, VT USA, building security software for your team. SOOS, Software security, simplified.

Use SOOS to scan your software for vulnerabilities and open source license issues with SOOS Core SCA. Generate and ingest SBOMs. Export reports to industry standards. Govern your open source dependencies. Run the SOOS DAST vulnerability scanner against your web apps or APIs. Scan your Docker containers for vulnerabilities. Check your source code for issues with SAST Analysis.

Demo SOOS or Register for a Free Trial.

If you maintain an Open Source project, sign up for the Free as in Beer SOOS Community Edition.

soos-sca

NPM package to run SOOS Core SCA

Supported Languages and Package Managers

Our full list of supported manifest formats can be found here.

Need an Account?

Visit soos.io to create your trial account.

Requirements

Installation

Globally

run npm i -g @soos-io/soos-sca@latest

Then Run soos-sca from any terminal and add the parameters you want.

Locally

run npm install --prefix ./soos @soos-io/soos-sca

Then run from the same terminal node ./soos/node_modules/@soos-io/soos-sca/bin/index.js

Running the Script

See Script Knowlege Base Documentation

Linux Shell Script Example

See Linux GitHub Gist

Windows CMD Script Example

See Windows Batch File Gist

Client Parameters

| Argument | Default | Description | | --- | --- | --- | | --apiKey | | SOOS API Key - get yours from SOOS Integration. Uses SOOS_API_KEY env value if present.
| --branchName | | The name of the branch from the SCM System. | | --branchURI | | The URI to the branch from the SCM System. | | --buildURI | | URI to CI build info. | | --buildVersion | | Version of application build artifacts. | | --clientId | | SOOS Client ID - get yours from SOOS Integration. Uses SOOS_API_CLIENT env value if present. | | --commitHash | | The commit hash value from the SCM System. | | --directoriesToExclude | **/node_modules/**, "**/bin/**", "**/obj/**", "**/lib/** | Listing of directories or patterns to exclude from the search for manifest files. eg: bin/start/, /start/ | | --filesToExclude | | Listing of files or patterns to exclude from the search for manifest files. eg: /req.txt/, **/requirements.txt | | --logLevel | | Minimum level to show logs: DEBUG, INFO, WARN, FAIL, ERROR. | | --onFailure | continue_on_failure | Action to perform when the scan fails. Options: fail_the_build, continue_on_failure. | | --operatingEnvironment | | Set Operating environment for information purposes only. | | --outputFormat | | Output format for vulnerabilities: only the value SARIF is available at the moment. | | --packageManagers | | A list of package managers, delimited by comma, to include when searching for manifest files. | | --projectName | | Project Name - this is what will be displayed in the SOOS app. | | --sarif | | Generates SARIF report. | | --scriptVersion | | None provided. | | --sourceCodePath | process.cwd() | Root path to begin recursive search for manifests. | | --verbose | false | Enable verbose logging. | | --workingDirectory | process.cwd() | Absolute path where SOOS may write and read persistent files for the given build. eg Correct: /tmp/workspace/ | Incorrect: ./bin/start/ |

Feedback and Support

See SOOS Knowledge Base