Skip to main content

Scan your dependencies for weaponized vulnerabilities. Powered by ThreatPulse x402.

Project description

ThreatPulse CLI

Scan your dependencies for weaponized vulnerabilities. Powered by threatpulse.waltsoft.net.

Install

pip install threatpulse

Authentication

ThreatPulse requires an API key for CLI usage. Purchase at threatpulse.waltsoft.net.

# Set once (recommended)
export THREATPULSE_KEY=tp_live_your_key_here

# Or pass per-command
threatpulse scan --key tp_live_your_key_here

Lost your key? Recover it at https://threatpulse.waltsoft.net/key/recover with your purchase email.

Check balance:

curl -H "Authorization: Bearer tp_live_..." https://threatpulse.waltsoft.net/key/balance

Usage

# Scan a lockfile
threatpulse scan --file package-lock.json

# Fail CI if urgency >= 80
threatpulse scan --threshold 80

# JSON output for piping
threatpulse scan --format json | jq '.[] | select(.urgency_score > 70)'

# SARIF for GitHub Code Scanning
threatpulse scan --format sarif > results.sarif

What makes this different

Unlike Trivy/Snyk/Inspector, ThreatPulse tells you if a CVE is actively weaponized:

🔴 CVE-2024-45257   HIGH       weaponized   95   metasploit:exploit/unix/webapp/byob_unauth_rce
🟡 CVE-2025-1234    MEDIUM     poc          45   github.com/user/CVE-2025-1234
🟢 CVE-2025-5678    LOW        none         12   no known exploit

Supported lockfiles

  • package-lock.json (npm)
  • requirements.txt (pip)
  • Cargo.lock (Rust)
  • go.sum (Go)
  • Gemfile.lock (Ruby)

GitHub Action

- uses: awsdataarchitect/threatpulse-action@v1
  with:
    fail-on-urgency: 80

Links

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

threatpulse-0.2.1.tar.gz (4.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

threatpulse-0.2.1-py3-none-any.whl (4.9 kB view details)

Uploaded Python 3

File details

Details for the file threatpulse-0.2.1.tar.gz.

File metadata

  • Download URL: threatpulse-0.2.1.tar.gz
  • Upload date:
  • Size: 4.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.4

File hashes

Hashes for threatpulse-0.2.1.tar.gz
Algorithm Hash digest
SHA256 5ccc62f04375e2f41af812341aa906cd0b42aeae9e21adced0a30f652fd491fa
MD5 fd0240af092b473534f7bc2f9dfa2950
BLAKE2b-256 61d9b44550331432ddda78e4b785351587945bd78e5388a3f3aee9c40f4e818e

See more details on using hashes here.

File details

Details for the file threatpulse-0.2.1-py3-none-any.whl.

File metadata

  • Download URL: threatpulse-0.2.1-py3-none-any.whl
  • Upload date:
  • Size: 4.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.4

File hashes

Hashes for threatpulse-0.2.1-py3-none-any.whl
Algorithm Hash digest
SHA256 523bdcb0eea77a809a356352efe92b1c4af71674801e6bb34a0049e4b9fc66a9
MD5 92fd01a384d0f6fce8aaa3677dd86cf8
BLAKE2b-256 080a71d5e78ffa88ff60dc3e32eebbdd1227305cebf15d2d89fb6c96efbf9ffc

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page