Get Vulfy up and running in 5 minutes! This tutorial will walk you through installation, your first scan, and basic automation setup.
- A project with package files (npm, Python, Rust, Java, Go, Ruby, C++, PHP, or .NET)
- Internet connection (for OSV.dev API access)
- Command line access
# Linux/WSL
curl -LO https://github.com/mindPatch/vulfy/releases/latest/download/vulfy-linux-x86_64.tar.gz
tar -xzf vulfy-linux-x86_64.tar.gz
sudo mv vulfy /usr/local/bin/
# macOS
curl -LO https://github.com/mindPatch/vulfy/releases/latest/download/vulfy-macos-x86_64.tar.gz
tar -xzf vulfy-macos-x86_64.tar.gz
sudo mv vulfy /usr/local/bin/cargo install vulfyvulfy --version
# Should output: vulfy 0.1.0Navigate to any project directory and run:
vulfy scan packagesExample Output:
π Scanning for package files...
π¦ Found 3 package files across 2 ecosystems
π‘οΈ VULNERABILITY REPORT
βββββββββββββββββββββββββββββββββββββββββββ¬βββββββββββββββ¬βββββββββββ¬ββββββββββββββββββ¬βββββββ
β Title β CVE ID β Severity β Package β Year β
βββββββββββββββββββββββββββββββββββββββββββΌβββββββββββββββΌβββββββββββΌββββββββββββββββββΌβββββββ€
β Prototype Pollution in lodash β CVE-2021-123 β π₯ High β lodash@4.17.0 β 2021 β
β SQL Injection in sequelize β CVE-2020-789 β π‘ Mediumβ sequelize@5.0.0 β 2020 β
βββββββββββββββββββββββββββββββββββββββββββ΄βββββββββββββββ΄βββββββββββ΄ββββββββββββββββββ΄βββββββ
π SCAN SUMMARY
β’ Total packages scanned: 42
β’ Vulnerable packages: 2
β’ Total vulnerabilities: 2
β’ π₯ High severity: 1
β’ π‘ Medium severity: 1
Congratulations! π You've just completed your first vulnerability scan!
vulfy scan packages --format json --output security-report.jsonvulfy scan packages --format csv --output vulnerabilities.csvvulfy scan packages --format sarif --output vulfy.sarifvulfy scan packages --high-only# Only scan npm and Python packages
vulfy scan packages --ecosystems npm,pypivulfy scan packages --no-dev-depsvulfy automation init --with-examplesThis creates vulfy-automation.toml with example configuration.
Edit the generated file to monitor your own repository:
[[repositories]]
name = "my-project"
url = "https://github.com/username/my-project.git"
branches = ["main"]
ecosystems = ["npm", "pypi"] # Adjust for your project
[schedule]
frequency = "daily"
time = "02:00"
timezone = "UTC"
[notifications]
enabled = false # Enable after setting up webhook# Validate config
vulfy automation validate
# Run manual scan
vulfy automation runIn just 5 minutes, you've:
β
Installed Vulfy and verified it works
β
Scanned your first project for vulnerabilities
β
Tried different output formats (JSON, CSV, SARIF)
β
Learned filtering options for focused scanning
β
Set up basic automation configuration
- Review vulnerabilities found - Check if any need immediate attention
- Set up CI/CD integration - Add Vulfy to your build pipeline
- Configure notifications - Set up Discord/Slack alerts
- Set Up Automation - Complete automation guide
- CI/CD Integration - Add to your pipelines
- Custom Policies - Create advanced filtering rules
# Scan npm dependencies
vulfy scan packages --ecosystems npm --no-dev-deps
# Focus on production dependencies
vulfy scan packages --ecosystems npm --no-dev-deps --high-only# Scan Python packages
vulfy scan packages --ecosystems pypi
# Include conda environments
vulfy scan packages --ecosystems pypi --path ./environment.yml# Scan all supported ecosystems
vulfy scan packages
# Target specific combinations
vulfy scan packages --ecosystems npm,pypi,go# Scan Cargo dependencies
vulfy scan packages --ecosystems crates.io
# Quick check for high-severity issues
vulfy scan packages --ecosystems crates.io --high-only --quiet- Make sure you're in a project directory
- Check supported file names in the Getting Started Guide
- Use
--pathto specify a different directory
- Ensure internet connectivity
- Check if your firewall blocks HTTPS requests
- OSV.dev API might be temporarily unavailable
- Make sure
vulfybinary is executable:chmod +x vulfy - On macOS, allow the binary in Security & Privacy settings
# Basic scan
vulfy scan packages
# Scan with output file
vulfy scan packages --format json --output report.json
# High-severity only
vulfy scan packages --high-only --quiet
# Initialize automation
vulfy automation init --with-examples
# Manual automation scan
vulfy automation run--path- Specify directory to scan--format- Output format (table, json, csv, sarif)--output- Save to file--ecosystems- Filter package managers--high-only- Show only high-severity vulnerabilities--quiet- Suppress progress output
You're now ready to use Vulfy for vulnerability scanning! The tool will help you:
- Identify security issues in your dependencies
- Monitor projects continuously with automation
- Integrate security scanning into your development workflow
- Stay informed about new vulnerabilities
For more advanced features, check out the complete User Guide and Automation Documentation.
Next: CI/CD Integration - Add Vulfy to your build pipelines