2023-08-06 12:08:26 +05:30
2023-08-17 23:21:28 +05:30
2023-08-20 14:50:50 +05:30
2023-08-20 14:50:50 +05:30
2023-01-12 20:32:21 +05:30
2023-08-21 20:08:56 +05:30
2023-08-21 20:08:56 +05:30
2022-12-30 09:09:03 +05:30
2023-08-06 12:08:26 +05:30
2023-08-17 20:46:01 +05:30
2023-08-24 11:47:04 +05:30
2023-01-12 20:32:21 +05:30

SafeDep Vet

🙌 Refer to https://safedep.io/docs for the documentation 📖

Go Report Card License Release OpenSSF Scorecard CodeQL SLSA 3 Scorecard supply-chain security Twitter

vet banner

Automate Open Source Package Vetting in CI/CD

vet is a tool for identifying risks in open source software supply chain. It helps engineering and security teams to identify potential issues in their open source dependencies and evaluate them against organizational policies.

🔥 vet in action

vet Demo

Getting Started

  • Download the binary file for your operating system / architecture from the Official GitHub Releases

  • You can also install vet using homebrew in MacOS and Linux

brew tap safedep/tap
brew install safedep/tap/vet
  • Alternatively, build from source

Ensure $(go env GOPATH)/bin is in your $PATH

go install github.com/safedep/vet@latest
vet auth trial --email john.doe@example.com

vet register trial

A time limited trial API key will be sent over email.

  • Configure vet to use API key to access the insights
vet auth configure

vet configure

Insights API is used to enrich OSS packages with metadata for rich query and policy decisions. Alternatively, the API key can be passed through environment variable VET_API_KEY

  • You can verify the configured key is successful by running the following command
vet auth verify

Using Community Mode

Community mode can be used to avoid registering and obtaining an API key.

vet auth configure --community

Running Scan

  • Run vet to identify risks
vet scan -D /path/to/repository

vet scan directory

  • You can also scan a specific (supported) package manifest
vet scan --lockfiles /path/to/pom.xml
vet scan --lockfiles /path/to/requirements.txt
vet scan --lockfiles /path/to/package-lock.json

Example Security Gate using vet to prevent introducing new OSS dependency risk in an application.

Scanning SBOM

vet scan --lockfiles /path/to/cyclonedx-sbom.json --lockfile-as bom-cyclonedx
  • To scan an SBOM in SPDX format
vet scan --lockfiles /path/to/spdx-sbom.json --lockfile-as bom-spdx

Note: SBOM scanning feature is currently in experimental stage

Scanning Github Repositories

  • Setup github access token to scan private repo
vet connect github

Alternatively, set GITHUB_TOKEN environment variable with Github PAT

  • To scan remote Github repositories, including private ones
vet scan --github https://github.com/safedep/vet

Note: You may need to enable Dependency Graph at repository or organization level for Github repository scanning to work.

Available Parsers

  • To list supported package manifest parsers including experimental modules
vet scan parsers --experimental

📖 Documentation

vet docs

🎊 Community

First of all, thank you so much for showing interest in vet, we appreciate it ❤️

SafeDep Discord

🔖 References

Description
Next Generation Software Composition Analysis (SCA) with Malicious Package Detection, Code Context & Policy as Code
Readme Apache-2.0 24 MiB
v1.12.5 Latest
2025-09-05 14:25:43 -05:00
Languages
Go 94.6%
templ 2%
Python 0.9%
Shell 0.8%
JavaScript 0.8%
Other 0.9%