security-scanning
Security Scanning
Run static analysis, dependency audits, secret detection, and container scanning.
Static Analysis (SAST)
Semgrep — find code-level vulnerabilities
# Scan current directory with auto-detected rules
semgrep scan --config auto .
# Scan with OWASP top 10 rules
semgrep scan --config "p/owasp-top-ten" .
# Scan specific language
semgrep scan --config "p/python" src/
# Output as JSON for processing
semgrep scan --config auto --json . | jq '.results[] | {path: .path, line: .start.line, rule: .check_id, message: .extra.message}'
# Scan with severity filter
semgrep scan --config auto --severity ERROR .
Dependency Vulnerability Scanning (SCA)
Trivy — scan project dependencies
# Scan filesystem for vulnerable dependencies
trivy fs --severity HIGH,CRITICAL .
# Scan with JSON output
trivy fs --format json --output trivy-report.json .
# Scan specific lockfile
trivy fs --scanners vuln package-lock.json
# Scan and fail on critical (useful for CI)
trivy fs --exit-code 1 --severity CRITICAL .
Snyk — dependency and code scanning
# Test dependencies for known vulnerabilities
snyk test
# Monitor project (registers with Snyk dashboard)
snyk monitor
# Test a specific manifest
snyk test --file=requirements.txt
# Code analysis
snyk code test
# Show dependency tree
snyk test --print-deps
npm/pnpm audit (no extra tools needed)
# npm
npm audit --json | jq '.vulnerabilities | to_entries[] | {name: .key, severity: .value.severity, via: .value.via[0]}'
# pnpm
pnpm audit --json
# pip (Python)
pip audit --format json
Secret Detection
TruffleHog — find leaked credentials
# Scan git history for secrets
trufflehog git file://. --json | jq '{detector: .DetectorName, file: .SourceMetadata.Data.Git.file, line: .SourceMetadata.Data.Git.line}'
# Scan filesystem only (no git history)
trufflehog filesystem . --json
# Scan specific branch
trufflehog git file://. --branch main
# Scan since specific commit
trufflehog git file://. --since-commit abc123
Container Image Scanning
Trivy — scan Docker images
# Scan a local image
trivy image --severity HIGH,CRITICAL myapp:latest
# Scan with full report
trivy image --format json --output image-report.json myapp:latest
# Scan remote image
trivy image --severity CRITICAL nginx:latest
Grype — image vulnerability scanner
# Scan local image
grype myapp:latest
# Scan with severity filter
grype myapp:latest --only-fixed --fail-on critical
# Scan from Dockerfile build context
grype dir:.
# JSON output
grype myapp:latest -o json | jq '.matches[] | {name: .vulnerability.id, severity: .vulnerability.severity, package: .artifact.name}'
Quick Triage Workflow
- Secrets first —
trufflehog git file://. --json(most urgent, leaked creds = immediate risk) - Dependencies —
trivy fs --severity HIGH,CRITICAL .(known CVEs in your supply chain) - Code —
semgrep scan --config auto .(your own code vulnerabilities) - Images —
trivy image myapp:latest(if containerized)
Notes
- Always review findings before acting — false positives are common in SAST.
- Severity levels: CRITICAL > HIGH > MEDIUM > LOW > INFO. Focus on CRITICAL and HIGH first.
- For CI pipelines, use
--exit-code 1(Trivy) or--error(Semgrep) to fail builds on findings. - Secret detection in git history can be slow on large repos. Use
--since-committo limit scope. - Run
snyk authbefore first use of Snyk CLI.
More from thinkfleetai/thinkfleet-engine
local-whisper
Local speech-to-text using OpenAI Whisper. Runs fully offline after model download. High quality transcription with multiple model sizes.
149flyio-cli-public
Use the Fly.io flyctl CLI for deploying and operating apps on Fly.io: deploys (local or remote builder), viewing status/logs, SSH/console, secrets/config, scaling, machines, volumes, and Fly Postgres (create/attach/manage databases). Use when asked to deploy to Fly.io, debug fly deploy/build/runtime failures, set up GitHub Actions deploys/previews, or safely manage Fly apps and Postgres.
24kagi-search
Web search using Kagi Search API. Use when you need to search the web for current information, facts, or references. Requires KAGI_API_KEY in the environment.
22feishu-bridge
Connect a Feishu (Lark) bot to ThinkFleet via WebSocket long-connection. No public server, domain, or ngrok required. Use when setting up Feishu/Lark as a messaging channel, troubleshooting the Feishu bridge, or managing the bridge service (start/stop/logs). Covers bot creation on Feishu Open Platform, credential setup, bridge startup, macOS launchd auto-restart, and group chat behavior tuning.
13bambu-local
Control Bambu Lab 3D printers locally via MQTT (no cloud). Supports A1, A1 Mini, P1P, P1S, X1C.
10voice-transcribe
Transcribe audio files using OpenAI's gpt-4o-mini-transcribe model with vocabulary hints and text replacements. Requires uv (https://docs.astral.sh/uv/).
10