pub struct Cli {Show 48 fields
pub paths: Vec<PathBuf>,
pub all_clients: bool,
pub client: Option<ClientType>,
pub remote: Option<String>,
pub git_ref: String,
pub remote_auth: Option<String>,
pub remote_list: Option<PathBuf>,
pub awesome_claude_code: bool,
pub parallel_clones: usize,
pub badge: bool,
pub badge_format: BadgeFormat,
pub summary: bool,
pub format: OutputFormat,
pub strict: bool,
pub warn_only: bool,
pub min_severity: Option<Severity>,
pub min_rule_severity: Option<RuleSeverity>,
pub scan_type: ScanType,
pub recursive: bool,
pub ci: bool,
pub verbose: bool,
pub include_tests: bool,
pub include_node_modules: bool,
pub include_vendor: bool,
pub min_confidence: Confidence,
pub skip_comments: bool,
pub fix_hint: bool,
pub watch: bool,
pub init_hook: bool,
pub remove_hook: bool,
pub malware_db: Option<PathBuf>,
pub no_malware_scan: bool,
pub cve_db: Option<PathBuf>,
pub no_cve_scan: bool,
pub custom_rules: Option<PathBuf>,
pub baseline: bool,
pub check_drift: bool,
pub init: bool,
pub output: Option<PathBuf>,
pub save_baseline: Option<PathBuf>,
pub baseline_file: Option<PathBuf>,
pub compare: Option<Vec<PathBuf>>,
pub fix: bool,
pub fix_dry_run: bool,
pub mcp_server: bool,
pub deep_scan: bool,
pub profile: Option<String>,
pub save_profile: Option<String>,
}Fields§
§paths: Vec<PathBuf>Paths to scan (files or directories)
all_clients: boolScan all installed AI coding clients (Claude, Cursor, Windsurf, VS Code)
client: Option<ClientType>Scan a specific AI coding client
remote: Option<String>Remote repository URL to scan (e.g., https://github.com/user/repo)
git_ref: StringGit ref (branch, tag, or commit) for remote scan
remote_auth: Option<String>GitHub token for authentication (or use GITHUB_TOKEN env var)
remote_list: Option<PathBuf>File containing list of repository URLs to scan (one per line)
awesome_claude_code: boolScan all repositories from awesome-claude-code
parallel_clones: usizeMaximum number of parallel repository clones
badge: boolGenerate security badge
badge_format: BadgeFormatBadge output format (url, markdown, html)
summary: boolShow summary only (for batch scans)
format: OutputFormatOutput format
strict: boolStrict mode: show medium/low severity findings and treat warnings as errors
warn_only: boolWarn-only mode: treat all findings as warnings (exit code 0)
min_severity: Option<Severity>Minimum severity level to include in output (critical, high, medium, low)
min_rule_severity: Option<RuleSeverity>Minimum rule severity to treat as errors (error, warn)
scan_type: ScanTypeScan type
recursive: boolRecursive scan
ci: boolCI mode: non-interactive output
verbose: boolVerbose output
include_tests: boolInclude test directories (tests/, spec/, tests, etc.) in scan
include_node_modules: boolInclude node_modules directories in scan
include_vendor: boolInclude vendor directories (vendor/, third_party/) in scan
min_confidence: ConfidenceMinimum confidence level for findings to be reported
skip_comments: boolSkip comment lines when scanning (lines starting with #, //, –, etc.)
fix_hint: boolShow fix hints in terminal output
watch: boolWatch mode: continuously monitor files for changes and re-scan
init_hook: boolInstall cc-audit pre-commit hook in the git repository
remove_hook: boolRemove cc-audit pre-commit hook from the git repository
malware_db: Option<PathBuf>Path to a custom malware signatures database (JSON)
no_malware_scan: boolDisable malware signature scanning
cve_db: Option<PathBuf>Path to a custom CVE database (JSON)
no_cve_scan: boolDisable CVE vulnerability scanning
custom_rules: Option<PathBuf>Path to a custom rules file (YAML format)
baseline: boolCreate a baseline snapshot for drift detection (rug pull prevention)
check_drift: boolCheck for drift against saved baseline
init: boolGenerate a default configuration file template
output: Option<PathBuf>Output file path (for HTML/JSON output)
save_baseline: Option<PathBuf>Save baseline to specified file
baseline_file: Option<PathBuf>Compare against baseline file (show only new findings)
compare: Option<Vec<PathBuf>>Compare two paths and show differences
fix: boolAuto-fix issues (where possible)
fix_dry_run: boolPreview auto-fix changes without applying them
mcp_server: boolRun as MCP server
deep_scan: boolEnable deep scan with deobfuscation
profile: Option<String>Load settings from a named profile
save_profile: Option<String>Save current settings as a named profile
Trait Implementations§
Source§impl Args for Cli
impl Args for Cli
Source§fn augment_args<'b>(__clap_app: Command) -> Command
fn augment_args<'b>(__clap_app: Command) -> Command
Source§fn augment_args_for_update<'b>(__clap_app: Command) -> Command
fn augment_args_for_update<'b>(__clap_app: Command) -> Command
Command so it can instantiate self via
FromArgMatches::update_from_arg_matches_mut Read moreSource§impl CommandFactory for Cli
impl CommandFactory for Cli
Source§impl FromArgMatches for Cli
impl FromArgMatches for Cli
Source§fn from_arg_matches(__clap_arg_matches: &ArgMatches) -> Result<Self, Error>
fn from_arg_matches(__clap_arg_matches: &ArgMatches) -> Result<Self, Error>
Source§fn from_arg_matches_mut(
__clap_arg_matches: &mut ArgMatches,
) -> Result<Self, Error>
fn from_arg_matches_mut( __clap_arg_matches: &mut ArgMatches, ) -> Result<Self, Error>
Source§fn update_from_arg_matches(
&mut self,
__clap_arg_matches: &ArgMatches,
) -> Result<(), Error>
fn update_from_arg_matches( &mut self, __clap_arg_matches: &ArgMatches, ) -> Result<(), Error>
ArgMatches to self.Source§fn update_from_arg_matches_mut(
&mut self,
__clap_arg_matches: &mut ArgMatches,
) -> Result<(), Error>
fn update_from_arg_matches_mut( &mut self, __clap_arg_matches: &mut ArgMatches, ) -> Result<(), Error>
ArgMatches to self.