scores single [arg] [--interactive]scores batch --input-file <path> [--output-file <path>]scores single command when you need to process one vulnerability.arg (optional): A valid JSON string representing a VulnerabilityMetadata object. This argument allows you to pass vulnerability details directly to the CLI for processing.class VulnerabilityMetadata(BaseModel):
  vulnerability_description: str
  finding: str
  finding_description: str | None = None  
  cwe: list[str] | None = None  
  cvss_v3: str | None = None
--interactive: Run the CLI in interactive mode. When this option is used, the CLI will prompt you to enter the required fields one by one.scores single --interactivevulnerability_description: A description of the vulnerability (required).finding: The finding associated with the vulnerability (required).cwe: A comma-separated list of Common Weakness Enumerations (optional).cvss_v3: An existing CVSS v3 vector (optional).scores single '{"vulnerability_description": "Example desctiption",
  "finding": "F123",
  "cwe": ["CWE-79"],
  "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/C:N/I:N/A:N"
}'batch subcommand when you need to process multiple vulnerabilities at once.scores batch --input-file <path> [--output-file <path>]--input-file <path> (required) Path to a JSON file mapping CVE keys to vulnerability objects:{
  "CVE-2025-1234": { /* VulnerabilityMetadata */ },
  "CVE-2025-5678": { /* VulnerabilityMetadata */ }
}
                                    --output-file <path> (optional) Where to write the result JSON (defaults to output.json next to the input file). The output has the shape:{
  "CVE-2025-1234": "CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
  "CVE-2025-5678": "CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
                                    scores batch --input-file path/to/vulns.jsonscores batch \
  --input-file path/to/vulns.json \
  --output-file path/to/results.json