@@ -141,7 +141,7 @@ This will generate a file in your current directory titled `exclusions.yml`.
141141Now when you run the ` scan ` command, you can use the exclusions file like this:
142142
143143``` bash
144- cloudsplaining scan --exclusions-file exclusions.yml --file examples/files/example.json --output examples/files/
144+ cloudsplaining scan --exclusions-file exclusions.yml --input examples/files/example.json --output examples/files/
145145```
146146
147147For more information on the structure of the exclusions file, see [ Filtering False Positives] ( #filtering-false-positives )
@@ -153,7 +153,7 @@ Now that we've downloaded the account authorization file, we can scan *all* of t
153153Run the following command:
154154
155155``` bash
156- cloudsplaining scan --exclusions-file exclusions.yml --file examples/files/example.json --output examples/files/
156+ cloudsplaining scan --exclusions-file exclusions.yml --input examples/files/example.json --output examples/files/
157157```
158158
159159It will create an HTML report like [ this] ( https://opensource.salesforce.com/cloudsplaining/ ) :
@@ -243,7 +243,7 @@ exclude-actions:
243243Now when you run the `scan` command, you can use the exclusions file like this :
244244
245245` ` ` bash
246- cloudsplaining scan --exclusions-file exclusions.yml --file examples/files/example.json --output examples/files/
246+ cloudsplaining scan --exclusions-file exclusions.yml --input examples/files/example.json --output examples/files/
247247` ` `
248248
249249
@@ -252,7 +252,7 @@ cloudsplaining scan --exclusions-file exclusions.yml --file examples/files/examp
252252You can also scan a single policy file to identify risks instead of an entire account.
253253
254254` ` ` bash
255- cloudsplaining scan-policy-file --file examples/policies/explicit-actions.json
255+ cloudsplaining scan-policy-file --input examples/policies/explicit-actions.json
256256` ` `
257257
258258The output will include a finding description and a list of the IAM actions that do not leverage resource constraints.
@@ -283,13 +283,13 @@ cloudsplaining download --profile someprofile
283283cloudsplaining download --profile all
284284
285285# Scan Authorization details
286- cloudsplaining scan --file default.json
286+ cloudsplaining scan --input default.json
287287# Scan Authorization details with custom exclusions
288- cloudsplaining scan --file default.json --exclusions-file exclusions.yml
288+ cloudsplaining scan --input default.json --exclusions-file exclusions.yml
289289
290290# Scan Policy Files
291- cloudsplaining scan-policy-file --file examples/policies/wildcards.json
292- cloudsplaining scan-policy-file --file examples/policies/wildcards.json --exclusions-file examples/example-exclusions.yml
291+ cloudsplaining scan-policy-file --input examples/policies/wildcards.json
292+ cloudsplaining scan-policy-file --input examples/policies/wildcards.json --exclusions-file examples/example-exclusions.yml
293293` ` `
294294
295295# # FAQ
0 commit comments