npm package discovery and stats viewer.

Discover Tips

  • General search

    [free text search, go nuts!]

  • Package details

    pkg:[package-name]

  • User packages

    @[username]

Sponsor

Optimize Toolset

I’ve always been into building performant and accessible sites, but lately I’ve been taking it extremely seriously. So much so that I’ve been building a tool to help me optimize and monitor the sites that I build to make sure that I’m making an attempt to offer the best experience to those who visit them. If you’re into performant, accessible and SEO friendly sites, you might like it too! You can check it out at Optimize Toolset.

About

Hi, 👋, I’m Ryan Hefner  and I built this site for me, and you! The goal of this site was to provide an easy way for me to check the stats on my npm packages, both for prioritizing issues and updates, and to give me a little kick in the pants to keep up on stuff.

As I was building it, I realized that I was actually using the tool to build the tool, and figured I might as well put this out there and hopefully others will find it to be a fast and useful way to search and browse npm packages as I have.

If you’re interested in other things I’m working on, follow me on Twitter or check out the open source projects I’ve been publishing on GitHub.

I am also working on a Twitter bot for this site to tweet the most popular, newest, random packages from npm. Please follow that account now and it will start sending out packages soon–ish.

Open Software & Tools

This site wouldn’t be possible without the immense generosity and tireless efforts from the people who make contributions to the world and share their work via open source initiatives. Thank you 🙏

© 2026 – Pkg Stats / Ryan Hefner

sanctionctl

v0.1.0

Published

CLI tool for OFAC/sanctions screening - search individuals and businesses against global sanctions lists

Readme

sanctionctl

CLI tool for OFAC/sanctions screening - check individuals and businesses against global sanctions lists.

npm version License

Installation

npm install -g sanctionctl
# or
npx sanctionctl <command>

Commands

Screen a Name

# Basic screening
sanctionctl check "Nicolas Maduro"

# Filter by entity type
sanctionctl check "Bank Rossiya" --type business

# Adjust match threshold
sanctionctl check "Putin" --min-match 0.80

# JSON output (for automation)
sanctionctl check "Kim Jong Un" --json

Batch Screening

Screen multiple names from a file:

# One name per line
sanctionctl batch customers.txt

# JSON array input
sanctionctl batch customers.json

# CSV output
sanctionctl batch customers.txt --csv --output results.csv

# JSON output
sanctionctl batch customers.txt --json --output results.json

Get Explanation (for AI agents)

sanctionctl explain "Vladimir Putin"

Returns structured JSON with risk assessment, recommended actions, and match details.

View Database

# Database statistics
sanctionctl stats

# List all sanctioned entities
sanctionctl list

# Filter by type
sanctionctl list --type person

# Filter by source
sanctionctl list --source us_ofac

Other Commands

# List available sanctions sources
sanctionctl sources

# Show risk thresholds
sanctionctl thresholds

Risk Levels

| Level | Score | Meaning | |-------|-------|---------| | 🚨 CRITICAL | ≥95% | Near-exact match. Block transaction. | | ⛔ HIGH | ≥85% | Very likely match. Manual review required. | | ⚠️ MEDIUM | ≥70% | Possible match. Additional verification needed. | | ⚡ LOW | ≥50% | Weak match. Likely false positive. | | ✅ CLEAR | <50% | No significant match. |

Supported Sources

| Code | Source | |------|--------| | us_ofac | US Treasury OFAC SDN List | | us_csl | US Consolidated Screening List | | us_bis_entity | US BIS Entity List | | un_consolidated | UN Consolidated Sanctions | | eu_consolidated | EU Financial Sanctions | | uk_ofsi | UK OFSI Consolidated List |

Programmatic Usage

import { screenName, screenBatch } from 'sanctionctl';

// Screen a single name
const result = screenName({
  name: 'Nicolas Maduro',
  type: 'person',
  minMatch: 0.70,
});

console.log(result.hasMatches);  // true
console.log(result.riskLevel);   // 'critical'
console.log(result.matches[0].name);  // 'MADURO MOROS, Nicolas'

// Batch screening
const batchResult = screenBatch([
  { name: 'John Smith' },
  { name: 'El Chapo' },
  { name: 'Jane Doe' },
]);

console.log(batchResult.matchCount);  // 1

Exit Codes

  • 0 - No matches (clear)
  • 1 - Matches found (or high/critical risk)

This allows integration with CI/CD pipelines:

sanctionctl check "Customer Name" || echo "Sanctions match found!"

Integration with AI Agents

The explain command returns agent-friendly JSON:

sanctionctl explain "Hezbollah" | jq .riskAssessment
{
  "level": "critical",
  "score": 1.0,
  "hasMatches": true,
  "interpretation": "Near-exact match to sanctioned entity...",
  "action": "BLOCK transaction and escalate to compliance officer..."
}

Related Tools

Disclaimer

This tool includes a sample sanctions database for demonstration purposes. For production use, integrate with official OFAC, UN, and other sanctions data sources. Consider using moov-io/watchman for production sanctions screening.

Author

Satyan Avatara - Avatara Consulting

License

Apache-2.0