Manual Quick Start
- Grab the latest RELEASE of intercept bundle for your platform
core-intercept-rg-x86_64-darwin.zip
core-intercept-rg-x86_64-linux.zip
core-intercept-rg-x86_64-windows.zip
- Make sure you have the latest setup
sh
intercept system --update
- Load some EXAMPLE policies and target files
start with the minimal.yaml
- Configure intercept
sh
intercept config -r
intercept config -a examples/policy/minimal.yaml
- Audit the target folder
sh
intercept audit -t examples/target
- Check the different output flavours
yml
- stdout human readable console report
- individual json rule output with detailed matches
- all findings compiled into intercept.output.json
- fully compliant SARIF output into intercept.sarif.json
- all SHA256 of the scanned files into intercept.scannedSHA256.json
- Tune the scan with extra flags like ENVIRONMENT or TAGS filter
sh
intercept audit -t examples/target -e "development" -i "AWS"