Vulfy is a lightning-fast vulnerability scanner that checks your project dependencies for known security issues across 9 programming languages. Built with Rust for maximum performance, it integrates with the OSV.dev database to provide accurate, up-to-date vulnerability information.
- ๐ฅ Lightning Fast - Async Rust performance with concurrent scanning
- ๐ Multi-Ecosystem Support - npm, Python, Rust, Java, Go, Ruby, C/C++, PHP, .NET
- ๐ Multiple Output Formats - Table, JSON, CSV, SARIF for different use cases
- ๐ฏ OSV.dev Integration - Real vulnerability data from Google's Open Source Vulnerabilities database
- โก Zero Configuration - Works out of the box, configure only what you need
- ๐ CI/CD Ready - Perfect exit codes and formats for automated pipelines
- ๐ค Automation & Monitoring - Continuous Git repository monitoring with smart notifications
- ๐ Advanced Policy Engine - Custom vulnerability filtering and security policies
- ๐ Multi-Platform Notifications - Discord, Slack, and webhook integrations
๐ Complete Documentation - Comprehensive guides, tutorials, and API reference
- ๐ 5-Minute Quick Start - Get scanning immediately
- โ๏ธ Installation Guide - All installation methods
- ๐ CLI Reference - Complete command documentation
- ๐ค Automation Setup - Continuous monitoring
- ๐ง Configuration Schema - Full configuration reference
# Linux/WSL
curl -LO https://github.com/mindPatch/vulfy/releases/latest/download/vulfy-linux-x86_64.tar.gz
tar -xzf vulfy-linux-x86_64.tar.gz
sudo mv vulfy /usr/local/bin/
# macOS (Intel)
curl -LO https://github.com/mindPatch/vulfy/releases/latest/download/vulfy-macos-x86_64.tar.gz
tar -xzf vulfy-macos-x86_64.tar.gz
sudo mv vulfy /usr/local/bin/
# macOS (Apple Silicon)
curl -LO https://github.com/mindPatch/vulfy/releases/latest/download/vulfy-macos-aarch64.tar.gz
tar -xzf vulfy-macos-aarch64.tar.gz
sudo mv vulfy /usr/local/bin/
cargo install vulfy
git clone https://github.com/mindPatch/vulfy.git
cd vulfy
cargo build --release
sudo cp target/release/vulfy /usr/local/bin/
Verify Installation:
vulfy --version
# Should output: vulfy 0.1.0
# Scan current directory
vulfy scan packages
# Scan specific directory
vulfy scan packages --path /path/to/project
# Only show high-severity vulnerabilities
vulfy scan packages --high-only
# JSON for automation/CI
vulfy scan packages --format json --output security-report.json
# CSV for spreadsheet analysis
vulfy scan packages --format csv --output vulnerabilities.csv
# SARIF for GitHub Security tab
vulfy scan packages --format sarif --output vulfy.sarif
# Fail build if high-severity vulnerabilities found
vulfy scan packages --high-only --quiet || exit 1
# Scan specific ecosystems only
vulfy scan packages --ecosystems npm,pypi --no-dev-deps
Ecosystem | Package Files | Status |
---|---|---|
๐ฆ npm | package-lock.json , yarn.lock , pnpm-lock.yaml , package.json |
โ |
๐ Python | requirements.txt , Pipfile.lock , poetry.lock , pyproject.toml |
โ |
๐ฆ Rust | Cargo.lock , Cargo.toml |
โ |
โ Java | pom.xml , build.gradle , build.gradle.kts |
โ |
๐น Go | go.mod , go.sum , go.work |
โ |
๐ Ruby | Gemfile.lock , Gemfile , *.gemspec |
โ |
โ๏ธ C/C++ | vcpkg.json , CMakeLists.txt , conanfile.txt |
๐ NEW! |
๐ PHP | composer.json , composer.lock |
๐ NEW! |
๐ท .NET | *.csproj , packages.config , *.nuspec |
๐ NEW! |
๐ Scanning for package files...
๐ฆ Found 6 package files across 4 ecosystems
๐ก๏ธ VULNERABILITY REPORT
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโฌโโโโโโโโโโโโโโโฌโโโโโโโโโโโฌโโโโโโโโโโโโโโโโโโฌโโโโโโโ
โ Title โ CVE ID โ Severity โ Package โ Year โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโผโโโโโโโโโโโโโโโผโโโโโโโโโโโผโโโโโโโโโโโโโโโโโโผโโโโโโโค
โ Remote Code Execution in lodash โ CVE-2021-123 โ ๐ฅ High โ [email protected] โ 2021 โ
โ Path Traversal in express โ CVE-2022-456 โ ๐ก Mediumโ [email protected] โ 2022 โ
โ SQL Injection in sequelize โ CVE-2020-789 โ ๐ฅ High โ [email protected] โ 2020 โ
โโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโโดโโโโโโโโโโโโโโโดโโโโโโโโโโโดโโโโโโโโโโโโโโโโโโดโโโโโโโ
๐ SCAN SUMMARY
โข Total packages scanned: 42
โข Vulnerable packages: 8
โข Total vulnerabilities: 12
โข ๐ฅ High severity: 4
โข ๐ก Medium severity: 6
โข ๐ข Low severity: 2
๐ See All Output Formats - JSON, CSV, SARIF examples
Vulfy includes a powerful automation system for continuous security monitoring of Git repositories.
- ๐ Multi-Repository Monitoring - Track multiple Git repos with branch-specific scanning
- โฐ Flexible Scheduling - Hourly, daily, weekly, or custom cron expressions
- ๐ Smart Notifications - Rich Discord/Slack alerts with severity-based filtering
- ๐ Advanced Policy Engine - Custom vulnerability filtering with keyword matching
- ๐ Authentication Support - GitHub tokens, SSH keys, private repository access
- ๐๏ธ Ecosystem Filtering - Per-repository ecosystem targeting for focused scans
# Initialize automation with example configuration
vulfy automation init --with-examples
# Validate configuration
vulfy automation validate
# Run manual scan using automation config
vulfy automation run
# Start continuous monitoring
vulfy automation start --foreground
# Monitor multiple repositories
[[repositories]]
name = "my-web-app"
url = "https://github.com/user/my-web-app.git"
branches = ["main", "develop"]
ecosystems = ["npm", "pypi"]
[repositories.credentials]
username = "git"
token = "your_github_token_here"
# Schedule daily scans at 2:00 AM UTC
[schedule]
frequency = "daily"
time = "02:00"
timezone = "UTC"
# Discord webhook notifications
[[notifications.webhooks]]
name = "Security Alerts"
url = "https://discord.com/api/webhooks/..."
webhook_type = "discord"
enabled = true
# Advanced security policies
[[policies]]
name = "Critical Authentication Issues"
enabled = true
[policies.conditions]
title_contains = ["authentication", "auth", "bypass"]
severity = ["high", "critical"]
[policies.actions]
notify = true
priority = "critical"
custom_message = "๐จ Critical auth vulnerability detected!"
๐ Complete Automation Guide - Detailed setup and configuration
vulfy scan packages [OPTIONS]
OPTIONS:
-p, --path <PATH> Directory to scan [default: current directory]
-f, --format <FORMAT> Output format: table, json, csv, summary, sarif
-o, --output <FILE> Save results to file
-e, --ecosystems <LIST> Only scan specific ecosystems (comma-separated)
-q, --quiet Suppress progress output
--high-only Show only high/critical severity vulnerabilities
--no-recursive Don't scan subdirectories
--no-dev-deps Skip development dependencies
Create .vulfy.toml
in your project root:
[scan]
ecosystems = ["npm", "pypi", "crates.io"]
min_severity = "medium"
skip_dev_deps = true
ignore_paths = ["node_modules", "vendor", ".git"]
[output]
format = "table"
color = "auto"
[api]
timeout = 30
max_concurrent = 10
retry_attempts = 3
๐ Full Configuration Reference - Complete schema documentation
- ๐ค Complete Automation System - Git repository monitoring with scheduling
- ๐ Multi-Platform Notifications - Discord, Slack, and webhook integrations
- ๐ Advanced Policy Engine - Custom vulnerability filtering and security policies
- ๐ 3 New Ecosystems - C/C++, PHP, and .NET support
- ๐ง Fix Mode - Automatically update vulnerable packages to safe versions
- ๐ Trend Analysis - Track vulnerability trends over time
- โก Watch Mode - Real-time monitoring for new vulnerabilities
- ๐พ Database Storage - Historical scan data and analytics
- ๐ณ Container Scanning - Docker image vulnerability detection
- ๐ Web Dashboard - Centralized security monitoring interface
- ๐ Plugin System - Extensible architecture for custom integrations
Have feature requests? Open an issue and let's discuss!
Vulfy is built with performance and reliability as core principles:
- โก Async-First Design - Built on Tokio for maximum concurrency
- ๐ง Strategy Pattern - Pluggable parsers for different package managers
- ๐ฆ Rate Limiting - Respectful API usage with configurable limits
- ๐พ Memory Efficient - Streaming parsers for large projects
- ๐ก๏ธ Error Resilient - Graceful handling of network and parsing errors
- ๐ Semantic Versioning - Proper version comparison using semver crate
๐ Architecture Deep Dive - Technical implementation details
We welcome contributions! Whether it's bug fixes, new features, or ecosystem support.
git clone https://github.com/mindPatch/vulfy.git
cd vulfy
cargo build
cargo test
- Follow Rust best practices and run
cargo clippy
- Add tests for new features
- Update documentation for user-facing changes
- Keep commit messages clear and descriptive
๐ Contributing Guide - Detailed contribution instructions
- ๐ Bug Reports: Create an issue
- ๐ก Feature Requests: Start a discussion
- โ Questions: GitHub Discussions
- ๐ Documentation: Complete docs
- "No package files found" - Ensure you're in a project directory with supported package files
- "Network connection failed" - Check internet connectivity; Vulfy needs access to OSV.dev API
- "Permission denied" - Make sure
vulfy
binary is executable:chmod +x vulfy
This project is licensed under the MIT License - see the LICENSE file for details.
- OSV.dev - Comprehensive vulnerability database
- Rust Community - Amazing crates and tooling ecosystem
- Contributors - Everyone who makes Vulfy better