You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -291,20 +292,20 @@ The following are the options and commands available with the Cycode CLI applica
291
292
292
293
The Cycode CLI application offers several types of scans so that you can choose the option that best fits your case. The following are the current options and commands available:
|`-t, --scan-type [secret\|iac\|sca\|sast]`| Specify the scan you wish to execute (`secret`/`iac`/`sca`/`sast`), the default is `secret`. |
297
-
|`--client-secret TEXT`| Specify a Cycode client secret for this specific scan execution. |
298
-
|`--client-id TEXT`| Specify a Cycode client ID for this specific scan execution. |
299
-
|`--show-secret BOOLEAN`| Show secrets in plain text. See [Show/Hide Secrets](#showhide-secrets) section for more details. |
300
-
|`--soft-fail BOOLEAN`| Run scan without failing, always return a non-error status code. See [Soft Fail](#soft-fail) section for more details. |
301
-
|`--severity-threshold [INFO\|LOW\|MEDIUM\|HIGH\|CRITICAL]`| Show only violations at the specified level or higher. |
302
-
|`--sca-scan`| Specify the SCA scan you wish to execute (`package-vulnerabilities`/`license-compliance`). The default is both. |
303
-
|`--monitor`| When specified, the scan results will be recorded inthe knowledge graph. Please note that when working in`monitor` mode, the knowledge graph will not be updated as a result of SCM events (Push, Repo creation). (Supported for SCA scan type only).|
304
-
|`--cycode-report`| When specified, displays a link to the scan report in the Cycode platform in the console output. |
305
-
|`--no-restore`| When specified, Cycode will not run restore command. Will scan direct dependencies ONLY!|
306
-
|`--gradle-all-sub-projects`| When specified, Cycode will run gradle restore commandfor all sub projects. Should run from root project directory ONLY!|
|`-t, --scan-type [secret\|iac\|sca\|sast]`| Specify the scan you wish to execute (`secret`/`iac`/`sca`/`sast`), the default is `secret`. |
298
+
|`--client-secret TEXT`| Specify a Cycode client secret for this specific scan execution. |
299
+
|`--client-id TEXT`| Specify a Cycode client ID for this specific scan execution. |
300
+
|`--show-secret BOOLEAN`| Show secrets in plain text. See [Show/Hide Secrets](#showhide-secrets) section for more details. |
301
+
|`--soft-fail BOOLEAN`| Run scan without failing, always return a non-error status code. See [Soft Fail](#soft-fail) section for more details. |
302
+
|`--severity-threshold [INFO\|LOW\|MEDIUM\|HIGH\|CRITICAL]`| Show only violations at the specified level or higher. |
303
+
|`--sca-scan`| Specify the SCA scan you wish to execute (`package-vulnerabilities`/`license-compliance`). The default is both. |
304
+
|`--monitor`| When specified, the scan results will be recorded inCycode. |
305
+
|`--cycode-report`| When specified, displays a link to the scan report in the Cycode platform in the console output. |
306
+
|`--no-restore`| When specified, Cycode will not run restore command. Will scan direct dependencies ONLY!|
307
+
|`--gradle-all-sub-projects`| When specified, Cycode will run gradle restore commandfor all sub projects. Should run from root project directory ONLY!|
@@ -328,16 +329,14 @@ The following command will scan the repository for policy violations that have s
328
329
> [!NOTE]
329
330
> This option is only available to SCA scans.
330
331
331
-
To push scan results tied to the [SCA policies](https://docs.cycode.com/docs/sca-policies) found in an SCA type scan to Cycode's knowledge graph, add the argument `--monitor` to the scan command.
332
+
To push scan results tied to the [SCA policies](https://docs.cycode.com/docs/sca-policies) found in an SCA type scan to Cycode, add the argument `--monitor` to the scan command.
332
333
333
334
Consider the following example. The following command will scan the repository for SCA policy violations and push them to Cycode:
When using this option, the scan results from this scan will appear in the knowledge graph, which can be found [here](https://app.cycode.com/query-builder).
338
+
When using this option, the scan results will appear inCycode.
338
339
339
-
> [!WARNING]
340
-
> You must be an `owner` or an `admin` in Cycode to view the knowledge graph page.
341
340
342
341
#### Cycode Report Option
343
342
@@ -838,6 +837,10 @@ To create an SBOM report for a path:\
0 commit comments