# Scanning

The CLI enables you to to easily detect vulnerable open-source dependencies and see for which ones a vulnerability-free sealed version exists.

Using the CLI is very simple:

1. Go to the root directory of the project and install its dependencies (e.g `npm install`).
2. Run `seal scan`. To save the output as a CSV use `seal scan --csv output.txt`. The dependencies will be checked against several vulnerability databases (such as OSV).
3. The results will be presented as a table of packages and vulnerabilities. The `CAN SEAL` and `SEALED VERSION` columns show whether the particular vulnerable package has a patched version that is available on Seal's artifact server. For example:

<table data-full-width="true"><thead><tr><th width="175">LIBRARY</th><th width="134">VERSION</th><th width="161">ECOSYSTEM</th><th width="290">VULNERABILITIES</th><th width="113">CAN SEAL	</th><th>SEALED VERSION</th></tr></thead><tbody><tr><td>d3-color</td><td>2.0.0</td><td>Node</td><td>GHSA-36jr-mh4h-2g58 (5.3)</td><td>V</td><td>2.0.0-sp1</td></tr><tr><td>semver</td><td>7.0.0</td><td>Node</td><td>CVE-2022-25883 (7.5)</td><td>V</td><td>7.0.0-sp1</td></tr><tr><td>set-value</td><td>3.0.3</td><td>Node</td><td>CVE-2021-23440 (7.3)</td><td>X</td><td></td></tr><tr><td>passport-saml</td><td>1.5.0</td><td>Node</td><td>CVE-2022-39299 (8.1)  CVE-2021-39171 (5.3)</td><td>V</td><td>1.5.0-sp1</td></tr><tr><td>axios</td><td>0.21.4</td><td>Node</td><td>CVE-2023-45857 (7.1)</td><td>V</td><td>0.21.4-sp1</td></tr></tbody></table>
