# Snyk CLI
[Snyk](https://snyk.io) scans and monitors your projects for security vulnerabilities.

# What is [Snyk](https://snyk.io)?
[Snyk](https://snyk.io) is a developer-first cloud-native security tool.
It covers multiple areas of application security:
1. [**Snyk Open Source**](https://snyk.io/product/open-source-security-management/): Find and automatically fix open source vulnerabilities
2. [**Snyk Code**](https://snyk.io/product/snyk-code/): Find and fix vulnerabilities in your application code in real time
3. [**Snyk Container**](https://snyk.io/product/container-vulnerability-management/): Find and fix vulnerabilities in container images and Kubernetes applications
4. [**Snyk Infrastructure as Code**](https://snyk.io/product/infrastructure-as-code-security/): Find and fix insecure configurations in Terraform and Kubernetes code
[Learn more about what Snyk can do and sign up for a free account ยป](https://snyk.io)
# What is Snyk CLI?
Snyk CLI brings the functionality of [Snyk](https://snyk.io) into your development workflow. It can be run locally or in your CI/CD pipeline to scan your projects for security issues.
## Supported languages and tools
Snyk supports many languages and tools, including Java, .NET, JavaScript, Python, Golang, PHP, C/C++, Ruby, Scala and more. See our [Language Support documentation](https://support.snyk.io/hc/en-us/articles/360020352437-Language-support-summary).
CLI also supports [Docker scanning](https://support.snyk.io/hc/en-us/articles/360003946897-Snyk-Container-security-overview) and [Terraform, k8s and other Infrastructure as Code files scanning](https://support.snyk.io/hc/en-us/categories/360001342678-Infrastructure-as-code).
---
# Install Snyk CLI
Snyk CLI can be installed through multiple channels.
## Install with npm or Yarn
[Snyk CLI is available as an npm package](https://www.npmjs.com/package/snyk). If you have Node.js installed locally, you can install it by running:
```bash
npm install snyk@latest -g
```
or if you are using Yarn:
```bash
yarn global add snyk
```
## More installation methods
Standalone executables (macOS, Linux, Windows)
### Standalone executables
Use [GitHub Releases](https://github.com/snyk/snyk/releases) to download a standalone executable of Snyk CLI for your platform.
We also provide these standalone executables on our official CDN. See [the `release.json` file](https://static.snyk.io/cli/latest/release.json) for the download links:
```text
https://static.snyk.io/cli/latest/release.json
# Or for specific version or platform
https://static.snyk.io/cli/v1.666.0/release.json
https://static.snyk.io/cli/latest/snyk-macos
```
For example, to download and run the latest Snyk CLI on macOS, you could run:
```bash
curl https://static.snyk.io/cli/latest/snyk-macos -o snyk
chmod +x ./snyk
mv ./snyk /usr/local/bin/
```
You can also use these direct links to download the executables:
- macOS: https://static.snyk.io/cli/latest/snyk-macos
- Windows: https://static.snyk.io/cli/latest/snyk-win.exe
- Linux: https://static.snyk.io/cli/latest/snyk-linux
- Linux (arm64): https://static.snyk.io/cli/latest/snyk-linux-arm64
- Alpine: https://static.snyk.io/cli/latest/snyk-alpine
Drawback of this method is, that you will have to manually keep the Snyk CLI up to date.
#### Verifying standalone binaries
You can verify both shasum of downloaded binaries and their GPG signatures.
Download location on `static.snyk.io` contains a file called `sha256sums.txt.asc`.
You can download it directly `https://static.snyk.io/cli/latest/sha256sums.txt.asc` or for a specific version like `https://static.snyk.io/cli/v1.666.0/sha256sums.txt.asc`.
To check that a downloaded file matches the checksum, use a `sha256sum` command like so:
```bash
grep snyk-macos sha256sums.txt.asc | sha256sum -c -
```
If you want to verify Snyk CLI standalone binaries against [Snyk CLI GPG key](help/_about-this-project/snyk-code-signing-public.pgp), you will need to import it first:
```bash
# 68BFBCCEB7794E6FC06A2044A29C32E91F4B9569 is the key belonging to code-signing@snyk.io
# Copy of this public key is also in this repository /help/_about-this-project/snyk-code-signing-public.pgp
gpg --keyserver hkps://keys.openpgp.org --recv-keys 68BFBCCEB7794E6FC06A2044A29C32E91F4B9569
```
Then verify the file is signed with:
```bash
gpg --verify sha256sums.txt.asc
```
Command output should look like:
```plain
gpg: Signature made Mon Apr 25 16:55:01 2022 CEST
gpg: using RSA key 68BFBCCEB7794E6FC06A2044A29C32E91F4B9569
gpg: Good signature from "Snyk Limited " [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
gpg: There is no indication that the signature belongs to the owner.
Primary key fingerprint: 68BF BCCE B779 4E6F C06A 2044 A29C 32E9 1F4B 9569
```
Install with Homebrew (macOS, Linux)
### Homebrew
Install Snyk CLI from [Snyk tap](https://github.com/snyk/homebrew-tap) with [Homebrew](https://brew.sh) by running:
```bash
brew tap snyk/tap
brew install snyk
```
Scoop (Windows)
### Scoop
Install Snyk CLI from our [Snyk bucket](https://github.com/snyk/scoop-snyk) with [Scoop](https://scoop.sh) on Windows:
```
scoop bucket add snyk https://github.com/snyk/scoop-snyk
scoop install snyk
```
Snyk CLI in a Docker image
### Snyk CLI in a Docker image
Snyk CLI can also be run from a Docker image. Snyk offers multiple Docker tags under [`snyk/snyk`](https://hub.docker.com/r/snyk/snyk). These images wrap the Snyk CLI and depending on the Tag come with a relevant tooling for different projects. [See the snyk/images on GitHub for more details and examples](https://github.com/snyk/snyk-images).
## Install as a part of a Snyk CLI integration
Snyk also offers many integrations into developer tooling. These integrations will install and manage the Snyk CLI for you. For example:
- [Snyk Jenkins plugin](https://github.com/jenkinsci/snyk-security-scanner-plugin)
- [CircleCI Orb](https://github.com/snyk/snyk-orb)
- [Azure Pipelines Task](https://github.com/snyk/snyk-azure-pipelines-task)
- [GitHub Actions](https://github.com/snyk/actions)
- [IntelliJ IDE Plugin](https://github.com/snyk/snyk-intellij-plugin)
- [VS Code Extension](https://marketplace.visualstudio.com/items?itemName=snyk-security.snyk-vulnerability-scanner)
- [Eclipse IDE Extension](https://github.com/snyk/snyk-eclipse-plugin)
- [Maven plugin](https://github.com/snyk/snyk-maven-plugin)
- And many more. See [the Integrations documentation](https://support.snyk.io/hc/en-us/categories/360000598398-Integrations)
---
# Getting started with Snyk CLI
Once you installed the Snyk CLI, you can verify it's working by running:
```bash
snyk --help
```
See the [full Snyk CLI help](./help/cli-commands).
## Authenticating Snyk CLI
Snyk CLI depends on [Snyk.io](https://snyk.io) APIs. Connect your Snyk CLI with [Snyk.io](https://snyk.io) by running:
```bash
snyk auth
```
## Setting up language support
Depending on your project's language, you might need to setup your language environment before using Snyk.
See our [Language Support documentation](https://support.snyk.io/hc/en-us/articles/360020352437-Language-support-summary).
## Scanning your project
If you are already in a folder with a supported project, start by running:
```bash
snyk test
```
Or scan a Docker image by its tag with [Snyk Container](https://snyk.io/product/container-vulnerability-management/):
```bash
snyk container test ubuntu:18.04
```
Or a k8s file:
```bash
snyk iac test /path/to/kubernetes_file.yaml
```
## Monitoring your project
Snyk can also monitor your project periodically and alert you for new vulnerabilities. The `snyk monitor` is similar to `snyk test` and can be used to create a project on the Snyk website that will be continuously monitored for new vulnerabilities.
```
> snyk monitor
Monitoring /project (project-name)...
Explore this snapshot at https://app.snyk.io/org/my-org/project/29361c2c-9005-4692-8df4-88f1c040fa7c/history/e1c994b3-de5d-482b-9281-eab4236c851e
Notifications about newly disclosed issues related to these dependencies will be emailed to you.
```
### Add Snyk to your CI/CD
Snyk is really powerful when you are continuously scanning and monitoring your projects for vulnerabilities.
Use one of [our integrations](#install-as-a-part-of-a-snyk-cli-integration) to stay secure.
You can authorize Snyk CLI in your CI/CD programatically:
```bash
# Using a SNYK_TOKEN envvar (preferred)
SNYK_TOKEN= snyk test
# Or using a Snyk auth command
snyk auth
snyk test
```
## More flags and options to try
Here are some flags that you might find useful:
- `--severity-threshold=low|medium|high|critical`
Only report vulnerabilities of provided level or higher.
- `--json`
Prints results in JSON format.
- `--all-projects`
Auto-detect all projects in working directory
[See all the available commands and options](./help/cli-commands) by running `--help`:
```bash
snyk --help
# or get help for a specific command like
snyk iac --help
snyk code --help
```
# Getting support
If you need support using Snyk CLI, please [contact support](https://support.snyk.io).
We do not actively monitor GitHub Issues so any issues there may go unnoticed.
# Contributing
If you are an external contributor, before working on any contributions, please first [contact support](https://support.snyk.io) to discuss the issue or feature request with us.
If you are contributing to Snyk CLI, see [our contributing guidelines](CONTRIBUTING.md)
For information on how Snyk CLI is implemented, see [our design decisions](help/_about-this-project/README.md).
This repository is a monorepo, also covering other projects and tools:
- [`@snyk/fix`](packages/snyk-fix): npm package for `snyk fix` libraries.
- [`@snyk/protect`](packages/snyk-protect): npm package for [`snyk-protect`](https://www.npmjs.com/package/@snyk/protect) command.
# Security
For any security issues or concerns, please see [SECURITY.md](SECURITY.md) file in this repository.
# Notices
## Snyk API usage policy
The use of Snyk's API, whether through the use of the 'snyk' npm package or otherwise, is subject to the [Terms & Conditions](https://snyk.co/ucT6N).
---
Made with ๐ by Snyk