๐ Syncable IaC CLI
Automatically generate optimized Docker, Kubernetes, and cloud infrastructure configurations by analyzing your codebase.
โก Quick Start
Syncable IaC CLI analyzes your project and automatically generates production-ready infrastructure configurations. Supporting 260+ technologies across 5 major language ecosystems, it understands your stack and creates optimized IaC files tailored to your specific needs.
โก Quick Start
# Install
# Analyze any project
# Check for vulnerabilities
# Run security analysis (multiple modes available)
# Force update check (clears cache)
# Get help with any command
That's it! The CLI will detect your languages, frameworks, dependencies, and provide detailed insights about your project structure. The tool includes smart update notifications to keep you on the latest version.
๐ฏ What It Does
Syncable IaC CLI is like having a DevOps expert analyze your codebase:
- ๐ Analyzes - Detects languages, frameworks, dependencies, ports, and architecture patterns
- ๐ Audits - Checks for security vulnerabilities and configuration issues
- ๐ Generates - Creates optimized Dockerfiles, Compose files, and Terraform configs (coming soon)
Example Output
๐ Key Features
๐ Comprehensive Analysis
- Multi-language support - JavaScript/TypeScript, Python, Rust, Go, Java/Kotlin
- 260+ technologies - From React to Spring Boot, Django to Actix-web
- Architecture detection - Monolithic, microservices, serverless, and more
- Monorepo support - Analyzes complex multi-project repositories
๐ก๏ธ Turbo Security Engine (Covering Javascript / Python ---- Rust-, Go- & Java- Coming soon)
- 10-100x faster scanning - Rust-powered multi-pattern matching with smart file discovery
- 5 scan modes - From lightning-fast critical checks to comprehensive audits
- Smart gitignore analysis - Understands git status and provides risk assessments
- 260+ secret patterns - Detects API keys, tokens, certificates, and credentials
- Zero false positives - Advanced context-aware filtering excludes test data and documentation
๐ณ Docker Intelligence
- Dockerfile analysis - Understand existing Docker configurations
- Multi-stage detection - Identifies build optimization patterns
- Service mapping - Traces dependencies between containers
- Network topology - Visualizes service communication
๐ Smart Update System
- Intelligent caching - Checks every 2 hours when no update available
- Immediate notifications - Shows updates instantly when available
- Clear instructions - Provides multiple update methods with step-by-step guidance
- Zero-maintenance - Automatically keeps you informed of new releases
๐ ๏ธ Installation
Via Cargo (Recommended)
From Source
๐ Usage Guide
Basic Commands
# Analyze with different display formats
# Vulnerabilities analysis
# Security analysis with turbo engine (10-100x faster)
# Dependency analysis
Security Scan Modes
The turbo security engine offers 5 scan modes optimized for different use cases:
| Mode | Speed | Coverage | Use Case | Typical Time |
|---|---|---|---|---|
| Lightning | ๐ Fastest | Critical files only | Pre-commit hooks, CI checks | |
| Fast | โก Very Fast | Smart sampling | Development workflow | |
| Balanced | ๐ฏ Optimized | Good coverage | Regular security checks | |
| Thorough | ๐ Complete | Comprehensive | Security audits (default) | |
| Paranoid | ๐ต๏ธ Maximum | Everything + low severity | Compliance, releases |
๐ก๏ธ Security Detection Deep Dive
What We Detect
The turbo security engine scans for 260+ secret patterns across multiple categories:
๐ API Keys & Tokens
- Cloud Providers: AWS Access Keys, GCP Service Account Keys, Azure Storage Keys
- Services: Stripe API Keys, Twilio Auth Tokens, GitHub Personal Access Tokens
- Databases: MongoDB Connection Strings, Redis URLs, PostgreSQL passwords
- CI/CD: Jenkins API Tokens, CircleCI Keys, GitLab CI Variables
๐ Cryptographic Material
- Private Keys: RSA, ECDSA, Ed25519 private keys (.pem, .key files)
- Certificates: X.509 certificates, SSL/TLS certs
- Keystores: Java KeyStore files, PKCS#12 files
- SSH Keys: OpenSSH private keys, SSH certificates
๐ง Authentication Secrets
- JWT Secrets: JSON Web Token signing keys
- OAuth: Client secrets, refresh tokens
- SMTP: Email server credentials, SendGrid API keys
- LDAP: Bind credentials, directory service passwords
๐ Environment Variables
- Suspicious Names: Any variable containing "password", "secret", "key", "token"
- Base64 Encoded: Automatically detects encoded secrets
- URLs with Auth: Database URLs, API endpoints with embedded credentials
Smart Git Status Analysis
Our security engine provides intelligent risk assessment based on git status:
| Status | Risk Level | Meaning | Action Needed |
|---|---|---|---|
| ๐ข SAFE | Low | File properly ignored by .gitignore | โ No action needed |
| ๐ต OK | Low | File appears safe for version control | โ Monitor for changes |
| ๐ก EXPOSED | High | Contains secrets but NOT in .gitignore | โ ๏ธ Add to .gitignore immediately |
| ๐ด TRACKED | Critical | Contains secrets AND tracked by git | ๐จ Remove from git history |
Why Some Files Are "OK" Despite Not Being Gitignored
Files are marked as OK when they contain patterns that look like secrets but are actually safe:
- Documentation: Code in README files, API examples, tutorials
- Test Data: Mock API keys, placeholder values, example configurations
- Source Code: String literals that match patterns but aren't real secrets
- Lock Files: Package hashes in
package-lock.json,pnpm-lock.yaml,cargo.lock - Build Artifacts: Compiled code, minified files, generated documentation
Advanced False Positive Filtering
Our engine uses sophisticated techniques to minimize false positives:
๐ฏ Context-Aware Detection
# โ FALSE POSITIVE - Will be ignored
;
;
# โ
REAL SECRET - Will be detected
;
๐ Documentation Exclusions
- Comments in any language (
//,#,/* */,<!-- -->) - Markdown code blocks and documentation files
- README files, CHANGELOG, API docs
- Example configurations and sample files
๐งช Test Data Recognition
- Files in
/test/,/tests/,/spec/,__test__directories - Filenames containing "test", "spec", "mock", "fixture", "example"
- Common test patterns like "test123", "dummy", "fake"
๐ฆ Dependency File Intelligence
- Automatically excludes:
node_modules/,vendor/,target/ - Recognizes lock files:
yarn.lock,pnpm-lock.yaml,go.sum - Skips binary files, images, and compiled artifacts
Display Modes
Choose the output format that works best for you:
- Matrix (default) - Compact dashboard view
- Detailed - Comprehensive vertical layout
- Summary - Brief overview for CI/CD
- JSON - Machine-readable format
Example Security Output
| | |
| | |
| | |
Advanced Configuration
Create .syncable.toml in your project root:
[]
= true
= ["vendor", "node_modules", "target"]
[]
# Scan configuration
= "thorough" # Default scan mode
= true # Exit with error on high/critical findings
= true # Enable secret detection
= true # Enable code security pattern analysis
# Performance tuning
= 10 # Skip files larger than 10MB
= 0 # Auto-detect CPU cores (0 = auto)
= true # Enable result caching
= 100 # Cache size limit
# Pattern filtering
= [ # Scan these extensions first
"env", "key", "pem", "json", "yml", "yaml",
"toml", "ini", "conf", "config"
]
Command-Line Options
# Scan mode selection
# Output control
# Filtering options
# CI/CD integration
๐ Technology Coverage
By Language
- JavaScript/TypeScript (46) - React, Vue, Angular, Next.js, Express, Nest.js, and more
- Python (76) - Django, Flask, FastAPI, NumPy, TensorFlow, PyTorch, and more
- Java/JVM (98) - Spring Boot, Micronaut, Hibernate, Kafka, Elasticsearch, and more
- Go (21) - Gin, Echo, Fiber, gRPC, Kubernetes client, and more
- Rust (20) - Actix-web, Axum, Rocket, Tokio, SeaORM, and more
Package Managers
- npm, yarn, pnpm, bun (JavaScript)
- pip, poetry, pipenv, conda (Python)
- Maven, Gradle (Java)
- Cargo (Rust)
- Go modules (Go)
๐ Roadmap
โ Phase 1: Analysis Engine (Complete)
- Project analysis and technology detection
- Vulnerability scanning with 260+ supported packages
- Turbo Security Engine turbo-fast scanning with 5 modes
๐ Phase 2: AI-Powered Generation (In Progress)
- Smart Dockerfile generation
- Intelligent Docker Compose creation
- Cloud-optimized configurations
๐ Future Phases
- Kubernetes manifests & Helm charts
- Terraform modules for AWS/GCP/Azure
- CI/CD pipeline generation
- Real-time monitoring setup
๐ค Contributing
We welcome contributions! See CONTRIBUTING.md for guidelines.
# Run tests
# Check code quality
# Format code
๐ License
MIT License - see LICENSE for details.
๐ Acknowledgments
Built with Rust ๐ฆ and powered by the open-source community.
Need help? Check our documentation or open an issue.