scores single [arg] [--interactive]scores batch --input-file <path> [--output-file <path>]scores single command when you need to process one vulnerability.arg (optional): A valid JSON string representing a VulnerabilityMetadata object. This argument allows you to pass vulnerability details directly to the CLI for processing.class VulnerabilityMetadata(BaseModel):
vulnerability_description: str
finding: str
finding_description: str | None = None
cwe: list[str] | None = None
cvss_v3: str | None = None
--interactive: Run the CLI in interactive mode. When this option is used, the CLI will prompt you to enter the required fields one by one.scores single --interactivevulnerability_description: A description of the vulnerability (required).finding: The finding associated with the vulnerability (required).cwe: A comma-separated list of Common Weakness Enumerations (optional).cvss_v3: An existing CVSS v3 vector (optional).scores single '{"vulnerability_description": "Example desctiption",
"finding": "F123",
"cwe": ["CWE-79"],
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/C:N/I:N/A:N"
}'batch subcommand when you need to process multiple vulnerabilities at once.scores batch --input-file <path> [--output-file <path>]--input-file <path> (required) Path to a JSON file mapping CVE keys to vulnerability objects:{
"CVE-2025-1234": { /* VulnerabilityMetadata */ },
"CVE-2025-5678": { /* VulnerabilityMetadata */ }
}
--output-file <path> (optional) Where to write the result JSON (defaults to output.json next to the input file). The output has the shape:{
"CVE-2025-1234": "CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVE-2025-5678": "CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
scores batch --input-file path/to/vulns.jsonscores batch \
--input-file path/to/vulns.json \
--output-file path/to/results.json