Scan your dependencies for weaponized vulnerabilities. Powered by ThreatPulse x402.
Project description
ThreatPulse CLI
Scan your dependencies for weaponized vulnerabilities. Powered by threatpulse.waltsoft.net.
Install
pip install threatpulse
Authentication
ThreatPulse requires an API key for CLI usage. Purchase at threatpulse.waltsoft.net.
# Set once (recommended)
export THREATPULSE_KEY=tp_live_your_key_here
# Or pass per-command
threatpulse scan --key tp_live_your_key_here
Lost your key? Recover it at https://threatpulse.waltsoft.net/key/recover with your purchase email.
Check balance:
curl -H "Authorization: Bearer tp_live_..." https://threatpulse.waltsoft.net/key/balance
Usage
# Scan a lockfile
threatpulse scan --file package-lock.json
# Fail CI if urgency >= 80
threatpulse scan --threshold 80
# JSON output for piping
threatpulse scan --format json | jq '.[] | select(.urgency_score > 70)'
# SARIF for GitHub Code Scanning
threatpulse scan --format sarif > results.sarif
What makes this different
Unlike Trivy/Snyk/Inspector, ThreatPulse tells you if a CVE is actively weaponized:
🔴 CVE-2024-45257 HIGH weaponized 95 metasploit:exploit/unix/webapp/byob_unauth_rce
🟡 CVE-2025-1234 MEDIUM poc 45 github.com/user/CVE-2025-1234
🟢 CVE-2025-5678 LOW none 12 no known exploit
Supported lockfiles
package-lock.json(npm)requirements.txt(pip)Cargo.lock(Rust)go.sum(Go)Gemfile.lock(Ruby)
GitHub Action
- uses: awsdataarchitect/threatpulse-action@v1
with:
fail-on-urgency: 80
Links
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file threatpulse-0.2.2.tar.gz.
File metadata
- Download URL: threatpulse-0.2.2.tar.gz
- Upload date:
- Size: 4.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.4
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
601f97dc8ebc2ed61c8e83f1caadde18b2560b797fc4ab08bd0b8dba46f6f40f
|
|
| MD5 |
2e64cc3fa7111a66df171fe4c0351499
|
|
| BLAKE2b-256 |
f91fedbeee3baecdb56448393f0025fffc3888687c9087cd718489eadc99e992
|
File details
Details for the file threatpulse-0.2.2-py3-none-any.whl.
File metadata
- Download URL: threatpulse-0.2.2-py3-none-any.whl
- Upload date:
- Size: 4.9 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.11.4
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
aaef20526527b81d66f5a9df939e1b34d065da37bfa49b7f17c04417fb306174
|
|
| MD5 |
b20af660bb086c0237673e1e01f37367
|
|
| BLAKE2b-256 |
96ce1d77ad789039c90e64a07d2fdc716a7e04be76ec177656388398b30e371b
|