Quick start with Xygeni CLI
Last updated
Last updated
A Scan is the action performed by the Xygeni Scanner to find security issues in your project.
You can follow the steps below for a quick start guide to using the Xygeni CLI
An installation script is provided for automated installation.
The recommended, automated way to install the scanner is to use the installation script.
The Xygeni installation script
s provided by Xygeni
as a way to speed up your xygeni experience by setting your scanning environment as fast as possible.
Run one of the following commands depending on your preferences:
An Access Token, also referred to as an API token or API key, is used by applications such as the Xygeni Scanner or other integrations to access the Xygeni platform's API.
Describe what the token will be used for, choose the validity period, and select the permissions granted to the token. Click on the Generate
button:
Finally, the token is generated:
The variable XYGENI_TOKEN
refers to an environment variable that stores the Xygeni API token. This token will be used to authenticate with the service.
For a list of available options, execute ./install.sh --help
on Unix-based systems or PS .\install.ps1 --help
on Windows.
To begin, ensure that you have a file system folder containing your project content. This folder may be a clone of your repository or simply a directory housing the source code for your project.
Navigate to your project directory, with the command cd /my/project
. Once there, initiate a scan by running xygeni scan
. All vulnerabilities identified are listed, including their path and fix guidance.
You can also use these commands below for other cases:
To create an access token in the Dashboard, go to the Settings >>Profile>> Access tokens, then click on the Generate new token
button. Go to for further details.
IMPORTANT: In case you want the scanner performs checks against your repository and organization (See ), ensure that you provide your SCM and/or CI/ CD systems tokens to the scanner.
See to know more about this topic.
See for the full scanner command-line reference.
After the scan is done, log into the and navigate to the Governance tab to access the Security Posture Summary screen.
Go to for a guide to browse the dashboard.