Overview
The Cysmiq CLI lets you run policy checks in CI/CD pipelines, query vulnerabilities from scripts, and integrate security gates into your workflows.Installation
- macOS (Homebrew)
- macOS (Manual)
- Linux (Manual)
- Linux (Package Manager)
Install via Homebrew
Verify installation
Configuration
The CLI reads configuration from three sources, in order of precedence:- Command-line flags:
--base-url,--tenant,--token - Environment variables:
CYSMIQ_BASE_URL,CYSMIQ_TENANT,CYSMIQ_TOKEN - Config file:
~/.cysmiq/config.yaml
Required settings
| Setting | Flag | Environment variable | Description |
|---|---|---|---|
| Base URL | --base-url | CYSMIQ_BASE_URL | Base URL (e.g., https://app.cysmiq.com) |
| Tenant | --tenant | CYSMIQ_TENANT | Workspace slug |
| Token | --token | CYSMIQ_TOKEN | API token |
Config file
Create~/.cysmiq/config.yaml to avoid passing flags repeatedly:
~/.cysmiq/config.yaml
Commands
check
Run a policy check and set the exit code based on vulnerabilities found. Use this in CI/CD pipelines to gate deployments.Basic check
0: Check passed1: Check failed (vulnerabilities exceeded policy) or no scan found for provided SHA2: Configuration or API error
| Flag | Default | Description |
|---|---|---|
--repo | (auto-infer) | Repository identifier |
--ref | (auto-infer) | Git ref (branch or tag) |
--sha | (auto-infer) | Git commit SHA |
--fail-on | critical,high | Severities that cause failure |
--max-count | -1 (disabled) | Fail if total vulnerabilities exceeds this number |
--severity | (all) | Filter by severity: critical, high, medium, low |
--type | (all) | Filter by type: code, dependency, secret |
--confirmed | true | Only include confirmed vulnerabilities |
--triaged | (all) | Filter by triage status: yes or no |
--output | summary | Output format: summary, table, json |
Fail only on critical vulnerabilities
Check a specific commit
Fail if more than 10 vulnerabilities
JSON output for parsing
vulns list
List vulnerabilities for a repository.List vulnerabilities
| Flag | Default | Description |
|---|---|---|
--repo | (auto-infer) | Repository identifier |
--ref | (auto-infer) | Git ref (branch or tag) |
--sha | Git commit SHA | |
--severity | (all) | Filter by severity |
--type | (all) | Filter by type |
--confirmed | true | Only include confirmed vulnerabilities |
--triaged | (all) | Filter by triage status |
--limit | 50 | Max items per page (1-200) |
--all | false | Fetch all pages |
--cursor | Pagination cursor | |
--output | table | Output format: summary, table, json |
List all critical vulnerabilities
Export as JSON
vulns summary
Show a vulnerability count summary without listing individual items.Show summary
| Flag | Default | Description |
|---|---|---|
--output | summary | Output format: summary, json |
vulns summary requires --repo or auto-inferred repo context.
version
Print version information.Show version
update
Update the CLI to the latest version.Update to latest
| Flag | Description |
|---|---|
--check | Check for updates without installing |
--force | Force update even if installed via a package manager |
Check for updates
CI/CD integration
The CLI auto-infers repository, ref, and SHA from common CI environments. Set--no-infer to disable this behavior.
Use
--no-infer when running the CLI outside the target repo or when you need to query a different repo, ref, or SHA than the CI environment. Then pass --repo, --ref, and --sha explicitly.GitHub Actions
GitHub Actions workflow
GitLab CI
GitLab CI configuration
CircleCI
CircleCI configuration
Global options
These options apply to all commands:| Flag | Environment variable | Description |
|---|---|---|
--base-url | CYSMIQ_BASE_URL | API base URL |
--tenant | CYSMIQ_TENANT | Workspace slug |
--token | CYSMIQ_TOKEN | API token |
--no-infer | CYSMIQ_NO_INFER | Disable auto-inference from CI environment |
--repo | - | Repository identifier or name |
--ref | - | Git ref (branch or tag) |
--sha | - | Git commit SHA |
--confirmed | - | Only confirmed vulnerabilities |
--triaged | - | Filter triaged status (yes or no) |
--severity | - | Filter by severities (critical, high, medium, low) |
--type | - | Filter by types (code, dependency, secret) |
--limit | - | Max items to fetch (1-200) |
Related docs
- API keys: Generate tokens for CLI authentication
- Vulnerability lifecycle: Understanding vulnerability statuses