Skip to main content

A CLI tool for scanning GitHub repositories for vulnerabilities, secrets, and generating SBOMs

Project description

Prismor CLI

A powerful command-line tool for scanning GitHub repositories for security vulnerabilities, secrets, and generating Software Bill of Materials (SBOM).

Get started at https://prismor.dev - Sign up for free to get your API key and access full dashboarding and analysis features!

Features

  • ๐Ÿ” Vulnerability Scanning (scan) - Detect security vulnerabilities in your codebase
  • ๐Ÿ” Secret Detection - Find exposed secrets, API keys, and credentials
  • ๐Ÿ“ฆ SBOM Generation - Generate comprehensive Software Bill of Materials
  • โšก Full Scan - Run all security checks in one command
  • ๐ŸŽจ Beautiful CLI Output - Colorful, easy-to-read results
  • ๐Ÿ”— Flexible Repository Input - Support for multiple GitHub URL formats including SSH, HTTPS, and bare domain formats

Quick Start

  1. Sign up at https://prismor.dev
  2. Generate your API Key from the dashboard
  3. Install the CLI: pip install prismor
  4. Set your API key: export PRISMOR_API_KEY=your_api_key
  5. Run your first scan: prismor --repo username/repo --fullscan

For the complete analysis with dashboards and reports, visit Prismor.dev after running scans!

Installation

Install Prismor CLI via pip:

pip install prismor

Prerequisites

Getting Your API Key

Before using Prismor CLI, you need to get your API key from Prismor.dev:

  1. Visit https://prismor.dev
  2. Sign up for a free account
  3. Navigate to your dashboard
  4. Generate an API Key
  5. Copy your API key

Setting Up Your API Key

Once you have your API key, set it as an environment variable:

export PRISMOR_API_KEY=your_api_key_here

To make this permanent, add it to your shell configuration file (~/.bashrc, ~/.zshrc, etc.):

echo 'export PRISMOR_API_KEY=your_api_key_here' >> ~/.zshrc
source ~/.zshrc

Private Repositories

To scan private repositories, you need to integrate your GitHub account:

  1. Go to Prismor.dev
  2. Navigate to Settings or Integrations
  3. Connect your GitHub account
  4. Authorize Prismor to access your private repositories

This allows Prismor to securely access and scan your private repositories.

Usage

Basic Syntax

prismor --repo <repository> [scan-type]

Note: The --scan flag is used to enable vulnerability scanning, while --repo specifies the repository to scan.

Repository Format

Prismor CLI supports multiple GitHub repository URL formats for maximum flexibility:

1. Username/Repository format (recommended):

prismor --repo Ar9av/trychai-web-revamped --fullscan

2. HTTPS URLs:

prismor --repo https://github.com/Ar9av/trychai-web-revamped --fullscan
prismor --repo https://www.github.com/Ar9av/trychai-web-revamped --fullscan
prismor --repo https://github.com/Ar9av/trychai-web-revamped.git --fullscan

3. HTTP URLs:

prismor --repo http://github.com/Ar9av/trychai-web-revamped --fullscan
prismor --repo http://www.github.com/Ar9av/trychai-web-revamped --fullscan

4. Bare domain formats:

prismor --repo github.com/Ar9av/trychai-web-revamped --fullscan
prismor --repo www.github.com/Ar9av/trychai-web-revamped --fullscan

5. SSH format:

prismor --repo git@github.com:Ar9av/trychai-web-revamped.git --fullscan

6. URLs with paths and fragments:

prismor --repo https://github.com/Ar9av/trychai-web-revamped/tree/main --fullscan
prismor --repo https://github.com/Ar9av/trychai-web-revamped/blob/main/file.py --fullscan
prismor --repo https://github.com/Ar9av/trychai-web-revamped#branch --fullscan

All formats are automatically parsed and normalized to extract the user/repo_name format for processing.

Smart URL Parsing

Prismor CLI features intelligent GitHub URL parsing that automatically:

  • โœ… Detects and extracts repository information from any supported format
  • โœ… Handles edge cases like trailing slashes, .git suffixes, and branch references
  • โœ… Validates input to ensure it's a valid GitHub repository
  • โœ… Provides clear error messages for unsupported formats
  • โœ… Supports special characters in repository names (hyphens, underscores, numbers)

Examples of what gets automatically parsed:

# All of these resolve to "facebook/react":
prismor --repo facebook/react --scan
prismor --repo https://github.com/facebook/react --scan
prismor --repo git@github.com:facebook/react.git --scan
prismor --repo github.com/facebook/react --scan
prismor --repo https://github.com/facebook/react/tree/main --scan

Scan Types

1. Vulnerability Scanning (scan)

Scan for security vulnerabilities in your dependencies and code:

prismor --repo myrepository --scan

Note: Vulnerability scans now run asynchronously for large repositories. The CLI will wait for completion automatically, but you can also use prismor start-scan to get a job ID and check status separately.

2. Secret Detection

Detect exposed secrets, API keys, passwords, and other sensitive information:

prismor --repo myrepository --detect-secret

3. SBOM Generation

Generate a Software Bill of Materials for your repository:

prismor --repo myrepository --sbom

4. Full Scan

Run all security checks (scan + Secret Detection + SBOM):

prismor --repo myrepository --fullscan

Multiple Scan Types

You can combine multiple scan types:

prismor --repo myrepository --scan --detect-secret

JSON Output

Get results in JSON format for automation and integration:

prismor --repo myrepository --fullscan --json

Examples

Example 1: Quick Vulnerability Scan (Username/Repo format)

prismor --repo facebook/react --scan

Example 2: Comprehensive Security Audit (HTTPS URL)

prismor --repo https://github.com/microsoft/vscode --fullscan

Example 3: Secret Detection with SSH URL

prismor --repo git@github.com:openai/gpt-3.git --detect-secret

Example 4: SBOM Generation with Bare Domain

prismor --repo github.com/kubernetes/kubernetes --sbom --json > sbom-results.json

Example 5: Full Scan with Branch Reference

prismor --repo https://github.com/tensorflow/tensorflow/tree/v2.13.0 --fullscan

Example 6: Multiple Scan Types with Different URL Formats

# Using HTTPS URL
prismor --repo https://github.com/pytorch/pytorch --scan --sbom

# Using SSH URL
prismor --repo git@github.com:nodejs/node.git --detect-secret --sbom

# Using bare domain
prismor --repo www.github.com/vercel/next.js --fullscan

Example 7: Save Results to File

# Save full scan results to JSON file
prismor --repo username/repo --fullscan --output results.json

# Save vulnerability scan with specific branch
prismor --repo username/repo --scan --branch develop --output vuln-scan.json

# Quiet mode with file output (no console output)
prismor --repo username/repo --sbom --output sbom.json --quiet

Example 8: CI/CD Integration

# Minimal output for CI/CD pipelines
prismor --repo $REPO_NAME --scan --quiet --json > scan-results.json

# Exit with error code if scan fails
prismor --repo username/repo --fullscan --quiet || exit 1

# Save results and continue pipeline
prismor --repo username/repo --scan --output scan.json --quiet && \
  echo "Scan completed, results saved to scan.json"

Example 7: Async Scan with Status Checking

# Start a scan and get job ID
prismor start-scan username/repo --branch main

# Check scan status (use job ID from previous command)
prismor scan-status <job_id>

# Check status with JSON output
prismor scan-status <job_id> --json

Additional Commands

Start Async Vulnerability Scan

Start a vulnerability scan asynchronously and get a job ID for status checking:

prismor start-scan username/repo
prismor start-scan username/repo --branch develop
prismor start-scan username/repo --token ghp_xxxxx

Note: Requires GitHub token. Set GITHUB_TOKEN environment variable or use --token option.

Check Scan Status

Check the status of a running or completed vulnerability scan:

prismor scan-status <job_id>
prismor scan-status <job_id> --json

Status Response Includes:

  • Job status (running/completed/failed)
  • Repository and branch information
  • Results URLs (public and presigned)
  • Vulnerability summary with severity breakdown
  • Scan date and duration

Example Output:

============================================================
  Scan Status
============================================================

Job ID: abc123def456...

Status: completed

Repository:
  https://github.com/username/repo

Branch:
  main

Vulnerability Summary:
  Total Vulnerabilities: 15
  Total Targets Scanned: 3

  Severity Breakdown:
    CRITICAL: 2
    HIGH: 5
    MEDIUM: 6
    LOW: 2

Results URL:
  https://prismor-sbom-public-dev.s3.amazonaws.com/...

Check Configuration

View your current Prismor CLI configuration:

prismor config

Version Information

Display the version of Prismor CLI:

prismor version

Or:

prismor --version

Help

Get help and see all available options:

prismor --help

Output

Prismor CLI provides clear, colorful output with:

  • โœ“ Success indicators
  • โœ— Error messages
  • โ„น Information updates
  • โš  Warnings
  • Detailed scan results including:
    • Repository information
    • Vulnerability counts
    • Secret detection findings
    • SBOM artifact counts
    • Download links for detailed reports

Full Analysis & Dashboarding

For comprehensive analysis and visualization of your scan results, visit the Prismor Dashboard:

Features Available on Prismor.dev:

  • ๐Ÿ“Š Interactive Dashboards - Visualize security trends and metrics
  • ๐Ÿ“ˆ Historical Analysis - Track vulnerabilities over time
  • ๐ŸŽฏ Detailed Reports - In-depth analysis of all findings
  • ๐Ÿ”” Alerts & Notifications - Get notified of critical issues
  • ๐Ÿ‘ฅ Team Collaboration - Share reports with your team
  • ๐Ÿ”„ CI/CD Integration - Automate scans in your pipeline
  • ๐Ÿ“ Repository Management - Manage multiple repositories in one place

Accessing Full Reports:

After running a scan with the CLI, you can:

  1. Visit https://prismor.dev
  2. Log into your dashboard
  3. View all your scan results with rich visualizations
  4. Export reports in various formats
  5. Set up automated scanning schedules

The CLI provides quick results in your terminal, while the web dashboard offers comprehensive analysis and long-term security monitoring.

API Information

Prismor CLI communicates with the Prismor API at https://api.prismor.dev. The CLI handles:

  • Authentication via API key
  • Request formatting
  • Error handling
  • Response parsing
  • Result presentation

Advanced Usage

Save Results to File

Save scan results to a JSON file for later analysis:

prismor --repo username/repo --fullscan --output results.json

Quiet Mode

Run scans with minimal output (useful for CI/CD pipelines):

prismor --repo username/repo --scan --quiet

Combining Options

Combine multiple options for customized workflows:

# Scan specific branch and save to file
prismor --repo username/repo --scan --branch develop --output scan-results.json

# Quiet mode with JSON output
prismor --repo username/repo --fullscan --quiet --json

# Save results without console output
prismor --repo username/repo --sbom --output sbom.json --quiet

Troubleshooting

API Key Not Set

Error:

โœ— PRISMOR_API_KEY environment variable is not set.

Solution:

# Set temporarily (current session only)
export PRISMOR_API_KEY=your_api_key_here

# Set permanently (add to ~/.bashrc or ~/.zshrc)
echo 'export PRISMOR_API_KEY=your_api_key_here' >> ~/.zshrc
source ~/.zshrc

Get your API key:

  1. Visit https://prismor.dev/cli
  2. Sign up for a free account
  3. Generate an API key from your dashboard

Invalid Repository Format

Error:

โœ— Unrecognized repository format

Supported formats:

  • โœ… username/repository (recommended)
  • โœ… https://github.com/username/repository
  • โœ… https://www.github.com/username/repository
  • โœ… http://github.com/username/repository
  • โœ… http://www.github.com/username/repository
  • โœ… github.com/username/repository
  • โœ… www.github.com/username/repository
  • โœ… git@github.com:username/repository.git
  • โœ… https://github.com/username/repository/tree/branch
  • โœ… https://github.com/username/repository/blob/branch/file

Not supported:

  • โŒ Non-GitHub URLs (GitLab, Bitbucket, etc.)
  • โŒ Invalid URL formats
  • โŒ Empty or malformed repository names
  • โŒ Repository names with invalid characters

Valid characters:

  • Alphanumeric (a-z, A-Z, 0-9)
  • Hyphens (-)
  • Underscores (_)
  • Dots (.)
  • Cannot start or end with special characters

Connection Issues

Error:

โœ— Failed to connect to Prismor API

Solutions:

  1. Check Internet Connection

    ping prismor.dev
    
  2. Verify API Endpoint

    curl -I https://prismor.dev
    
  3. Test API Key

    prismor config
    
  4. Check Firewall/Proxy

    • Ensure your firewall allows HTTPS connections
    • Configure proxy if needed:
      export HTTPS_PROXY=http://proxy.example.com:8080
      
  5. Retry with Automatic Retries

    • The CLI automatically retries failed requests 3 times with exponential backoff
    • If issues persist, check your network configuration

Timeout Issues

Error:

โœ— Request timed out

Solutions:

  1. Large Repositories

    • Vulnerability scans can take up to 10 minutes for large repositories
    • The CLI will wait automatically
    • Use --quiet mode to reduce output during long scans
  2. Network Latency

    • Check your internet speed
    • Try again during off-peak hours
    • Consider using a wired connection
  3. Check Scan Status

    # Start scan asynchronously
    prismor start-scan username/repo
    
    # Check status later
    prismor scan-status <job_id>
    

Private Repository Access

Error:

โœ— GitHub integration required

Solution:

  1. Visit https://prismor.dev/dashboard
  2. Navigate to Settings โ†’ Integrations
  3. Connect your GitHub account
  4. Authorize Prismor to access private repositories
  5. Try scanning again

Invalid Characters in Repository Name

Error:

โœ— Invalid Username: 'user@name'. Must contain only alphanumeric characters...

Solution:

  • Ensure repository name follows GitHub naming conventions
  • Remove special characters like @, #, $, etc.
  • Valid example: username/my-repo-name
  • Invalid example: user@name/repo#123

Rate Limiting

Error:

โœ— API error: Rate limit exceeded

Solution:

  1. Wait a few minutes before retrying
  2. Check your account limits at prismor.dev/dashboard
  3. Upgrade your plan if needed for higher limits

Getting Help

If you're still experiencing issues:

  1. Check Configuration

    prismor config
    
  2. View Account Status

    prismor status
    
  3. Enable Verbose Output

    • Remove --quiet flag to see detailed error messages
  4. Contact Support

Development

Local Installation

For development, clone the repository and install in editable mode:

git clone https://github.com/PrismorSec/prismor-cli.git
cd prismor-cli
pip install -e .

Project Structure

prismor-cli/
โ”œโ”€โ”€ prismor/
โ”‚   โ”œโ”€โ”€ __init__.py      # Package initialization
โ”‚   โ”œโ”€โ”€ cli.py           # CLI interface and commands
โ”‚   โ””โ”€โ”€ api.py           # API client and communication
โ”œโ”€โ”€ setup.py             # Package configuration
โ”œโ”€โ”€ requirements.txt     # Dependencies
โ””โ”€โ”€ README.md            # Documentation

Requirements

  • Python 3.7 or higher
  • click >= 8.0.0
  • requests >= 2.25.0

License

MIT License - See LICENSE file for details

Support

Need Help?

  1. Visit Prismor.dev for full documentation and support
  2. Check the dashboard for detailed scan results and analysis
  3. Join our community for questions and discussions

Contributing

Contributions are welcome! Please feel free to submit a Pull Request.


Made with โค๏ธ by Prismor

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

prismor-1.1.3.tar.gz (23.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

prismor-1.1.3-py3-none-any.whl (19.1 kB view details)

Uploaded Python 3

File details

Details for the file prismor-1.1.3.tar.gz.

File metadata

  • Download URL: prismor-1.1.3.tar.gz
  • Upload date:
  • Size: 23.6 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.7

File hashes

Hashes for prismor-1.1.3.tar.gz
Algorithm Hash digest
SHA256 5359a0411f2dd6a210f504cded70e1b7e1f712b3f049fa84d4934cbf69a6f9a9
MD5 e2ae4ce74bed8386e16e0dd705ab8fdd
BLAKE2b-256 22ab0ca88ab4c7706ea724dd5567a0681d4883e4e9b84bbf0a6eee1c67b64025

See more details on using hashes here.

File details

Details for the file prismor-1.1.3-py3-none-any.whl.

File metadata

  • Download URL: prismor-1.1.3-py3-none-any.whl
  • Upload date:
  • Size: 19.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.7

File hashes

Hashes for prismor-1.1.3-py3-none-any.whl
Algorithm Hash digest
SHA256 3779580022bf7e37241a5587d584e7919ab12825ab773ca3ed030bd3d25024ad
MD5 a0b71ea095eb0d4c53d123cd7f083cb5
BLAKE2b-256 4591f15ccf7f5aedd5e05cb6d0e55166454552dc67d9f8649a8cf624c0781576

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page