pub struct Cli {Show 70 fields
pub paths: Vec<PathBuf>,
pub all_clients: bool,
pub client: Option<ClientType>,
pub remote: Option<String>,
pub git_ref: String,
pub remote_auth: Option<String>,
pub remote_list: Option<PathBuf>,
pub awesome_claude_code: bool,
pub parallel_clones: usize,
pub badge: bool,
pub badge_format: BadgeFormat,
pub summary: bool,
pub format: OutputFormat,
pub strict: bool,
pub warn_only: bool,
pub min_severity: Option<Severity>,
pub min_rule_severity: Option<RuleSeverity>,
pub scan_type: ScanType,
pub recursive: bool,
pub ci: bool,
pub verbose: bool,
pub include_tests: bool,
pub include_node_modules: bool,
pub include_vendor: bool,
pub min_confidence: Confidence,
pub skip_comments: bool,
pub strict_secrets: bool,
pub fix_hint: bool,
pub compact: bool,
pub watch: bool,
pub init_hook: bool,
pub remove_hook: bool,
pub malware_db: Option<PathBuf>,
pub no_malware_scan: bool,
pub cve_db: Option<PathBuf>,
pub no_cve_scan: bool,
pub custom_rules: Option<PathBuf>,
pub baseline: bool,
pub check_drift: bool,
pub init: bool,
pub output: Option<PathBuf>,
pub save_baseline: Option<PathBuf>,
pub baseline_file: Option<PathBuf>,
pub compare: Option<Vec<PathBuf>>,
pub fix: bool,
pub fix_dry_run: bool,
pub mcp_server: bool,
pub hook_mode: bool,
pub pin: bool,
pub pin_verify: bool,
pub pin_update: bool,
pub pin_force: bool,
pub ignore_pin: bool,
pub deep_scan: bool,
pub profile: Option<String>,
pub save_profile: Option<String>,
pub report_fp: bool,
pub report_fp_dry_run: bool,
pub report_fp_endpoint: Option<String>,
pub no_telemetry: bool,
pub sbom: bool,
pub sbom_format: Option<String>,
pub sbom_npm: bool,
pub sbom_cargo: bool,
pub proxy: bool,
pub proxy_port: Option<u16>,
pub proxy_target: Option<String>,
pub proxy_tls: bool,
pub proxy_block: bool,
pub proxy_log: Option<PathBuf>,
}Fields§
§paths: Vec<PathBuf>Paths to scan (files or directories)
all_clients: boolScan all installed AI coding clients (Claude, Cursor, Windsurf, VS Code)
client: Option<ClientType>Scan a specific AI coding client
remote: Option<String>Remote repository URL to scan (e.g., https://github.com/user/repo)
git_ref: StringGit ref (branch, tag, or commit) for remote scan
remote_auth: Option<String>GitHub token for authentication (or use GITHUB_TOKEN env var)
remote_list: Option<PathBuf>File containing list of repository URLs to scan (one per line)
awesome_claude_code: boolScan all repositories from awesome-claude-code
parallel_clones: usizeMaximum number of parallel repository clones
badge: boolGenerate security badge
badge_format: BadgeFormatBadge output format (url, markdown, html)
summary: boolShow summary only (for batch scans)
format: OutputFormatOutput format
strict: boolStrict mode: show medium/low severity findings and treat warnings as errors
warn_only: boolWarn-only mode: treat all findings as warnings (exit code 0)
min_severity: Option<Severity>Minimum severity level to include in output (critical, high, medium, low)
min_rule_severity: Option<RuleSeverity>Minimum rule severity to treat as errors (error, warn)
scan_type: ScanTypeScan type
recursive: boolRecursive scan
ci: boolCI mode: non-interactive output
verbose: boolVerbose output
include_tests: boolInclude test directories (tests/, spec/, tests, etc.) in scan
include_node_modules: boolInclude node_modules directories in scan
include_vendor: boolInclude vendor directories (vendor/, third_party/) in scan
min_confidence: ConfidenceMinimum confidence level for findings to be reported
skip_comments: boolSkip comment lines when scanning (lines starting with #, //, –, etc.)
strict_secrets: boolStrict secrets mode: disable dummy key heuristics for test files By default, findings in test files have their confidence downgraded. This option disables that behavior and treats all secrets equally.
fix_hint: boolShow fix hints in terminal output
compact: boolUse compact output format (disable friendly advice)
watch: boolWatch mode: continuously monitor files for changes and re-scan
init_hook: boolInstall cc-audit pre-commit hook in the git repository
remove_hook: boolRemove cc-audit pre-commit hook from the git repository
malware_db: Option<PathBuf>Path to a custom malware signatures database (JSON)
no_malware_scan: boolDisable malware signature scanning
cve_db: Option<PathBuf>Path to a custom CVE database (JSON)
no_cve_scan: boolDisable CVE vulnerability scanning
custom_rules: Option<PathBuf>Path to a custom rules file (YAML format)
baseline: boolCreate a baseline snapshot for drift detection (rug pull prevention)
check_drift: boolCheck for drift against saved baseline
init: boolGenerate a default configuration file template
output: Option<PathBuf>Output file path (for HTML/JSON output)
save_baseline: Option<PathBuf>Save baseline to specified file
baseline_file: Option<PathBuf>Compare against baseline file (show only new findings)
compare: Option<Vec<PathBuf>>Compare two paths and show differences
fix: boolAuto-fix issues (where possible)
fix_dry_run: boolPreview auto-fix changes without applying them
mcp_server: boolRun as MCP server
hook_mode: boolRun as Claude Code Hook (reads from stdin, writes to stdout)
pin: boolPin MCP tool configurations for rug-pull detection
pin_verify: boolVerify MCP tool pins against current configuration
pin_update: boolUpdate MCP tool pins with current configuration
pin_force: boolForce overwrite existing pins
ignore_pin: boolSkip pin verification during scan
deep_scan: boolEnable deep scan with deobfuscation
profile: Option<String>Load settings from a named profile
save_profile: Option<String>Save current settings as a named profile
report_fp: boolReport a false positive finding
report_fp_dry_run: boolDry run mode for false positive reporting (print without submitting)
report_fp_endpoint: Option<String>Custom endpoint URL for false positive reporting
no_telemetry: boolDisable telemetry and false positive reporting
sbom: boolGenerate SBOM (Software Bill of Materials)
sbom_format: Option<String>SBOM output format (cyclonedx, spdx)
sbom_npm: boolInclude npm dependencies in SBOM
sbom_cargo: boolInclude Cargo dependencies in SBOM
proxy: boolEnable proxy mode for runtime MCP monitoring
proxy_port: Option<u16>Proxy listen port (default: 8080)
proxy_target: Option<String>Target MCP server address (host:port)
proxy_tls: boolEnable TLS termination in proxy mode
proxy_block: boolEnable blocking mode (block messages with findings)
proxy_log: Option<PathBuf>Log file for proxy traffic (JSONL format)
Trait Implementations§
Source§impl Args for Cli
impl Args for Cli
Source§fn augment_args<'b>(__clap_app: Command) -> Command
fn augment_args<'b>(__clap_app: Command) -> Command
Source§fn augment_args_for_update<'b>(__clap_app: Command) -> Command
fn augment_args_for_update<'b>(__clap_app: Command) -> Command
Command so it can instantiate self via
FromArgMatches::update_from_arg_matches_mut Read moreSource§impl CommandFactory for Cli
impl CommandFactory for Cli
Source§impl FromArgMatches for Cli
impl FromArgMatches for Cli
Source§fn from_arg_matches(__clap_arg_matches: &ArgMatches) -> Result<Self, Error>
fn from_arg_matches(__clap_arg_matches: &ArgMatches) -> Result<Self, Error>
Source§fn from_arg_matches_mut(
__clap_arg_matches: &mut ArgMatches,
) -> Result<Self, Error>
fn from_arg_matches_mut( __clap_arg_matches: &mut ArgMatches, ) -> Result<Self, Error>
Source§fn update_from_arg_matches(
&mut self,
__clap_arg_matches: &ArgMatches,
) -> Result<(), Error>
fn update_from_arg_matches( &mut self, __clap_arg_matches: &ArgMatches, ) -> Result<(), Error>
ArgMatches to self.Source§fn update_from_arg_matches_mut(
&mut self,
__clap_arg_matches: &mut ArgMatches,
) -> Result<(), Error>
fn update_from_arg_matches_mut( &mut self, __clap_arg_matches: &mut ArgMatches, ) -> Result<(), Error>
ArgMatches to self.