#csaf #vex #cli #command-line

app csaf-cli

A CLI to work with CSAF data

38 releases (7 breaking)

new 0.7.3 May 15, 2024
0.6.0 Apr 26, 2024
0.6.0-alpha.8 Feb 23, 2024
0.5.4 Oct 27, 2023
0.1.4 Jul 6, 2023

#374 in Command line utilities

Download history 17/week @ 2024-01-17 9/week @ 2024-01-24 2/week @ 2024-01-31 19/week @ 2024-02-14 134/week @ 2024-02-21 30/week @ 2024-02-28 24/week @ 2024-03-27 28/week @ 2024-04-03 243/week @ 2024-04-17 320/week @ 2024-04-24 163/week @ 2024-05-01

726 downloads per month

Apache-2.0 and LGPL-2.0-or-later

50K SLoC

JavaScript 43K SLoC // 0.1% comments Rust 7K SLoC // 0.0% comments


A tool to work with CSAF data from the command line.

This tool can also be used as a library: https://crates.io/crates/csaf-walker


  parse     Parse advisories
  download  Like sync, but doesn't validate
  scan      Scan advisories
  discover  Discover advisories, just lists the URLs
  sync      Sync only what changed, and alidate
  report    Analyze (and report) the state of the data
  send      Walk a source and send validated/retrieved documents to a sink
  metadata  Discover provider metadata
  help      Print this message or the help of the given subcommand(s)


Parse a CSAF document, or fail trying.


Discover a list of URLs, pointing to CSAF document on a remove server. This will perform the lookup of the metadata, and emit a URL per line with the discovered documents.


cargo run -- discover redhat.com


Discover and download CSAF documents.


Discover, download, and validate CSAF documents.

This works similar to the download command, but will also perform some integrity validation (like digest, signatures). It will, however, not verify the content of documents.


Discover, validate, and verify CSAF documents.

This discovers and temporarily downloads CSAF documents, performing validation and verification of the content.

NOTE: This commands works best of already downloaded data (a combination of running download and then report).


Discover, download, validate, and send CSAF documents to a remote endpoint.

Instead of storing content locally, this forwards content to a remote endpoint.


Take a source and try to discover the provider metadata. Showing the resulting JSON.

Common options


The CSAF tooling can discover and retrieve CSAF documents from two services: HTTP and file systems. Additionally, when downloading CSAF documents, the tool will write content into the file system, so that it can later be used as a file system source.

The idea behind that is that it is possible to split up the process of downloading and processing documents.

If a source string can be parsed as an https URL, it must point to the provider metadata. If the source string is a file URL, it needs to point to a local file system location created by sync or download. Otherwise, the source must be a domain name that will be used for discovering the CSAF provider metadata according to the specification.

NOTE: The structure of the filesystem storage is currently not considered an API. It is only guaranteed that whatever is store can be read back by tools of the same version. Also, it is currently not a format which can be hosted directly as a new CSAF repository.

Signature verification

When signatures get verified, it may be possible that signature algorithms are considered "too old". If that's the case, and you still want to allow them, it is possible to provide the "policy date", which sets the defaults for what is still allowed (also see: https://docs.rs/sequoia-policy-config/latest/sequoia_policy_config/).

Specifically, when encountering GPG v3 signatures, one can also use the -3 switch.


~1.5M SLoC