scores single [arg] [--interactive]
scores batch --input-file <path> [--output-file <path>]
scores single
command when you need to process one vulnerability.arg
(optional): A valid JSON string representing a VulnerabilityMetadata
object. This argument allows you to pass vulnerability details directly to the CLI for processing.class VulnerabilityMetadata(BaseModel):
vulnerability_description: str
finding: str
finding_description: str | None = None
cwe: list[str] | None = None
cvss_v3: str | None = None
--interactive
: Run the CLI in interactive mode. When this option is used, the CLI will prompt you to enter the required fields one by one.scores single --interactive
vulnerability_description
: A description of the vulnerability (required).finding
: The finding associated with the vulnerability (required).cwe
: A comma-separated list of Common Weakness Enumerations (optional).cvss_v3
: An existing CVSS v3 vector (optional).scores single '{
"vulnerability_description": "Example desctiption",
"finding": "F123",
"cwe": ["CWE-79"],
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/C:N/I:N/A:N"
}'
batch
subcommand when you need to process multiple vulnerabilities at once.scores batch --input-file <path> [--output-file <path>]
--input-file <path>
(required) Path to a JSON file mapping CVE keys to vulnerability objects:{
"CVE-2025-1234": { /* VulnerabilityMetadata */ },
"CVE-2025-5678": { /* VulnerabilityMetadata */ }
}
--output-file <path>
(optional) Where to write the result JSON (defaults to output.json
next to the input file). The output has the shape:{
"CVE-2025-1234": "CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVE-2025-5678": "CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
scores batch --input-file path/to/vulns.json
scores batch \
--input-file path/to/vulns.json \
--output-file path/to/results.json