
The scanners are available for use as follows:

Currently, you may use these standalone scanners:
Fluid Attacks created a full scanner CLI to perform SAST, SCA, DAST and CSPM scans as well as APK analysis. However, Fluid Attacks does not provide updates for this image since April, 2025. Any new feature or patch is and will be implemented only in the corresponding specific image (listed above). If you are still using the full CLI's image, you should migrate to the specific image that applies to your use case before November 1, 2025.Fluid Attacks' scanners' CLIs follow this structure:
CLI_NAME [GLOBAL_OPTIONS] COMMAND [ARGUMENTS]
CLI_NAME with the analysis identifier. Fluid Attacks provides five images named after the type of scan that they perform:sastscadastcspmapkUse the --help flag to get information about the tool's usage and a description of each available argument.
Examples:
sast --help
For the DAST CLI:
dast --help
Use the --strict flag to run the scanner in strict mode. This means the execution will fail (with an exit code 1) if it finds any vulnerabilities in your targets. This is ideal for using the scanner as a CI/CD job.
Example (replace path/to/config.yaml with the actual path to your configuration file, if using one):
sast --strict scan path/to/config.yaml
All of Fluid Attacks' scanners have one command option: scan
sast scan /my-dir

This argument is the path to the directory you want to scan.
Example (replace path/to/directory with the actual path to your target):
sca scan path/to/directory
This argument is a URL. Depending on the scanner you are using, you can use the following URLs:
Git repository URL: Using Fluid Attacks' SAST or SCA CLIs to download a repository and analyze it with static application security testing (SAST) and software composition analysis (SCA). For example, for SAST scans:
Use this for SCA scans:
Page or web application URL: Using Fluid Attacks' CLI to perform dynamic application security testing (DAST), using the URL of a page or web application.
Example:
dast scan https://www.google.com
This argument is the path to a YAML configuration file where you customize the vulnerability scanner's execution. To avoid confusion and possible problems, you should place this file in the same directory as the project you want to scan.
Example (replace path/to/config.yaml with the actual path to your configuration file):
sast scan path/to/config.yaml
namespace: myapp
output:
file_path: ./Fluid-Attacks-Results.csv
format: CSV
working_dir: .
language: EN
sast:
include:
- .
exclude:
- glob(**/node_modules/**)
- glob(**/test/**)
