<p align="center">
<a href="https://osv.dev">
<img src="https://git.playtrak.com.mx/public-content/PLAYTRAK.Sentinel/-/raw/master/docs/assets/header-playtrak-sentinel.png" alt="Sentinel Header" />
</a>
</p>
<p align="center">
<a href="https://pypi.org/project/playtrak-sentinel/"><img alt="PyPI" src="https://img.shields.io/pypi/v/sentinel"></a>
<a href="https://git.playtrak.com.mx/public-content/PLAYTRAK.Sentinel"><img alt="License" src="https://img.shields.io/badge/license-MIT-blue"></a>
<img alt="Python Versions" src="https://img.shields.io/pypi/pyversions/playtrak-sentinel">
</p>
Note
Sentinel is free and open-source. Contributions welcome!
Sentinel is a Python dependency vulnerability scanner powered by OSV.dev. It scans installed packages or requirements files for known security issues.
Sentinel is ideal for developers and teams who want to automate security checks in their local development and CI/CD pipelines.
requirements.txt.trakignore to skip known issues1 when vulnerabilities are foundThe job fails if any vulnerabilities are found.
Add a.trakignorefile to suppress specific known issues.
You can also export scan results with--jsonand--csvfor reporting.
Use Sentinel in CI pipelines easily with GitHub Actions:
name: Sentinel Scan
on:
push:
branches: [main]
pull_request:
jobs:
scan:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
- name: Set up Python
uses: actions/setup-python@v4
with:
python-version: '3.10'
- name: Install Sentinel
run: pip install playtrak-sentinel
- name: Run scan
run: sentinel -r requirements.txt
You can integrate Sentinel in GitLab CI pipelines using the following example:
stages:
- test
scan_vulnerabilities:
image: python:3.10
stage: test
before_script:
- pip install playtrak-sentinel
script:
- sentinel -r requirements.txt
Install via pip:
pip install playtrak-sentinel
Basic usage with default environment:
sentinel
Scan specific files:
sentinel -r requirements.txt
sentinel -r requirements.txt -r dev-requirements.txt
Export reports:
sentinel -r requirements.txt --json report.json --csv report.csv
Ignore specific vulnerabilities with .trakignore:
GHSA-xxxx-yyyy-zzzz
PYSEC-2023-0001
sentinel: Scan installed environment sentinel -r file.txt: Scan specific requirements file --json: Export to JSON --csv: Export to CSV .trakignore (optional) to skip vulnerabilities | Code | Meaning |
|---|---|
| 0 | No vulnerabilities found |
| 1 | Vulnerabilities detected |
| 2 | Usage error (e.g., no files) |
Supports Python 3.7 and above. We recommend using the latest LTS version of Python for compatibility and security.
Created by Eder Ramos for PLAYTRAK Sistemas de Monitoreo