Skip to main content

Scan your dependencies for weaponized vulnerabilities. Powered by ThreatPulse x402.

Project description

ThreatPulse CLI

Scan your dependencies for weaponized vulnerabilities. Powered by threatpulse.waltsoft.net.

Install

pip install threatpulse

Authentication

ThreatPulse requires an API key for CLI usage. Purchase at threatpulse.waltsoft.net.

# Set once (recommended)
export THREATPULSE_KEY=tp_live_your_key_here

# Or pass per-command
threatpulse scan --key tp_live_your_key_here

Lost your key? Recover it at https://threatpulse.waltsoft.net/key/recover with your purchase email.

Check balance:

curl -H "Authorization: Bearer tp_live_..." https://threatpulse.waltsoft.net/key/balance

Usage

# Scan a lockfile
threatpulse scan --file package-lock.json

# Fail CI if urgency >= 80
threatpulse scan --threshold 80

# JSON output for piping
threatpulse scan --format json | jq '.[] | select(.urgency_score > 70)'

# SARIF for GitHub Code Scanning
threatpulse scan --format sarif > results.sarif

What makes this different

Unlike Trivy/Snyk/Inspector, ThreatPulse tells you if a CVE is actively weaponized:

🔴 CVE-2024-45257   HIGH       weaponized   95   metasploit:exploit/unix/webapp/byob_unauth_rce
🟡 CVE-2025-1234    MEDIUM     poc          45   github.com/user/CVE-2025-1234
🟢 CVE-2025-5678    LOW        none         12   no known exploit

Supported lockfiles

  • package-lock.json (npm)
  • requirements.txt (pip)
  • Cargo.lock (Rust)
  • go.sum (Go)
  • Gemfile.lock (Ruby)

GitHub Action

- uses: awsdataarchitect/threatpulse-action@v1
  with:
    fail-on-urgency: 80

Links

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

threatpulse-0.2.2.tar.gz (4.0 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

threatpulse-0.2.2-py3-none-any.whl (4.9 kB view details)

Uploaded Python 3

File details

Details for the file threatpulse-0.2.2.tar.gz.

File metadata

  • Download URL: threatpulse-0.2.2.tar.gz
  • Upload date:
  • Size: 4.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.4

File hashes

Hashes for threatpulse-0.2.2.tar.gz
Algorithm Hash digest
SHA256 601f97dc8ebc2ed61c8e83f1caadde18b2560b797fc4ab08bd0b8dba46f6f40f
MD5 2e64cc3fa7111a66df171fe4c0351499
BLAKE2b-256 f91fedbeee3baecdb56448393f0025fffc3888687c9087cd718489eadc99e992

See more details on using hashes here.

File details

Details for the file threatpulse-0.2.2-py3-none-any.whl.

File metadata

  • Download URL: threatpulse-0.2.2-py3-none-any.whl
  • Upload date:
  • Size: 4.9 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.11.4

File hashes

Hashes for threatpulse-0.2.2-py3-none-any.whl
Algorithm Hash digest
SHA256 aaef20526527b81d66f5a9df939e1b34d065da37bfa49b7f17c04417fb306174
MD5 b20af660bb086c0237673e1e01f37367
BLAKE2b-256 96ce1d77ad789039c90e64a07d2fdc716a7e04be76ec177656388398b30e371b

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page