Commands
seal add <package-version>
This command adds an entry to your project's local configuration file, instructing Seal to apply a backported fix to all instances of the specified package version.
Flags:
--os: Use this flag to add a fix for a package that is part of the operating system.--fs <ecosystem>: Use this flag to fix a package within a specific filesystem ecosystem located in the target directory. Iftarget-diris not provided then it uses the current directory. Supported ecosystems includejavaandpython.
seal fix [target-dir]
seal fix [target-dir]This command replaces vulnerable packages with their secure, sealed versions directly within your project.
Flags:
--mode: Specifies which fixes to apply.local: Applies the fixes defined in your local configuration file (this is the default).remote: Applies fixes defined on the Seal server.all: Attempts to fix every vulnerable package for which a sealed version exists.
--os: Fixes vulnerable packages managed by the operating system's native package manager. This flag supports:yum: for CentOS, Red Hat Enterprise Linux, Oracle Linux, and similar.dpkg: for Debian, Ubuntu, and similar.apk: for Alpine.
--fs <ecosystem>: Fixes vulnerable packages found by scanning the filesystem within the specified[target-dir]. If no[target-dir]is provided, it defaults to the current directory. Supported ecosystems arejavaandpython.--upload-scan-results: Uploads the list of detected vulnerable packages to the Seal server. This is useful for deployments without a source control integration, as it allows Seal to discover and track your dependencies through your CI pipeline.
Arguments:
[target-dir]: The directory to scan for vulnerable packages when using the--fsflag.
seal help - Use this command to view the comprehensive usage instructions for the Seal CLI. It will print a list of all commands, flags, and their descriptions directly to your terminal.
seal scan [target-dir]
seal scan [target-dir]This command scans your project's open-source dependencies and prints a list of vulnerable packages, highlighting which ones have a sealed version available.
Flags
--os: Scans for vulnerable packages managed by your operating system's native package manager. This supportsyum(for CentOS, RHEL, etc.),dpkg(for Debian, Ubuntu, etc.), andapk(for Alpine).--fs <ecosystem>: Finds vulnerable packages by scanning the filesystem. If you don't provide a[target-dir], it uses the current directory. Supported ecosystems arejavaandpython.--generate-local-config: Creates or updates a local configuration file with recommended fixes, which you can then apply using theseal fixcommand.--generate-snyk-policy: Creates or updates the.snykfile to inform the Snyk scanner about vulnerabilities fixed by Seal. This flag must be used with--generate-local-config.--upload-scan-results: Uploads the detected vulnerable packages to the Seal server. This is useful for environments without source control integration, allowing Seal to discover your dependencies via your CI pipeline.--csv string: Saves the scan results to the specified file path in CSV format.
Arguments
[target-dir]: The directory to scan for vulnerable packages when using the--fsflag.
seal version - Prints the current version of the Seal CLI. The latest version is always available for download here.
Flags:
These flags can be used with any Seal CLI command.
-h, --help: Prints the usage instructions and available options for the specified command.-v, -vv, -vvv: Adjusts the logging verbosity level. This is useful for debugging and provides more detailed output.
Last updated