| layout | page |
|---|---|
| title | Quick Start Guide |
| nav_order | 1 |
This guide helps you get started with Insect's primary use case: safely analyzing external Git repositories.
-
Install Docker (required for safe external repo analysis)
# macOS brew install docker # Ubuntu/Debian sudo apt-get install docker.io # Or download from: https://docs.docker.com/get-docker/
-
Install Insect
pip install insect
# Instead of directly cloning:
# git clone https://github.com/example/suspicious-repo ❌
# Use Insect to analyze safely first:
insect clone https://github.com/example/suspicious-repo ✅Insect will show you:
- Number of security issues found
- Severity levels (critical, high, medium, low)
- Types of threats detected
- Sample findings for review
- No issues found: Repository appears safe to clone
- Issues found: Review details and decide whether to proceed
- Critical issues: Avoid cloning unless you understand the risks
If you choose to proceed, Insect will clone the repository locally.
# Analyze before adding to your project
insect clone https://github.com/author/library-name
# Generate detailed report for team review
insect clone https://github.com/author/library-name --report-path security-report.json# High sensitivity scan for comprehensive analysis
insect clone https://github.com/suspicious/repo --scan-args "--sensitivity very_high"
# Save detailed analysis
insect clone https://github.com/suspicious/repo --report-path investigation.json --scan-args "--format html"# Analyze specific branch
insect clone https://github.com/research/malware-sample --branch malicious-branch
# Use custom Docker image with additional tools
insect clone https://github.com/research/sample --image my-analysis-env:latest- Critical: Immediate security threats (malware, stealers)
- High: Serious vulnerabilities requiring attention
- Medium: Security issues that should be reviewed
- Low: Minor issues or potential improvements
- Browser Data Theft: Cookie stealers, password extractors
- Cryptocurrency Theft: Wallet stealers, private key extractors
- System Compromise: Command injection, backdoors
- Data Exfiltration: Secret harvesters, API key stealers
🚨 Never run untrusted code directly
🐳 Always use Docker for external repository analysis
📊 Review security reports before cloning
🔍 When in doubt, don't clone - investigate further
If you see "Docker not available":
- Install Docker following the prerequisites above
- Start Docker service:
sudo systemctl start docker(Linux) - Verify Docker works:
docker --version
If you get permission errors:
# Add your user to docker group (Linux)
sudo usermod -aG docker $USER
# Logout and login againIf repository cloning fails:
- Check internet connection
- Verify repository URL is correct
- Try with a public repository first
- External Scanning Guide - Comprehensive workflows
- Threat Detection Examples - What Insect finds
- Container Security - Docker setup details
- Dependency Vetting - Team workflows
# Basic analysis
insect clone https://github.com/user/repo
# High sensitivity analysis
insect clone https://github.com/user/repo --scan-args "--sensitivity very_high"
# Save detailed report
insect clone https://github.com/user/repo --report-path analysis.json
# Analyze specific branch
insect clone https://github.com/user/repo --branch feature-branch
# Check dependencies status
insect depsRemember: Analyze first, trust later.