grype
$ brew install grypeVulnerability scanning, sbom analysis, and policies from the terminal.
- grype fits infra well, especially for vulnerability scanning, sbom analysis, and policies from the terminal.
- It is the official CLI from Anchore.
- Good for scripts and agents.
- Good fit for coding-agent workflows and repeatable scripts.
- Structured output is available for automation and parsing.
Grype guide
The official CLI from Anchore. Vulnerability scanning, sbom analysis, and policies from the terminal. Supports structured output — good for scripts and agents.
Open CLI packages the install path, verify step, and safe-start workflow so this tool can move from “interesting CLI” to something you can actually use. It also integrates with skills.sh so each CLI comes with the right companion skills, not just a binary and a docs link.
When to apply
- vulnerability scanning, sbom analysis, and policies from the terminal.
- You want security scanning you can script with structured output.
- You need vulnerability scanning.
- You need sbom analysis.
- You need policies.
Quick reference
brew install grypegrype --versiongrype dir:.Open CLI × skills.sh
Open CLI integrates grype with the right skills.sh companions so you get the tool and the workflow together.
Security Best Practices
Recommended pairingOpen CLI recommends this skills.sh skill because it fits security workflows. Add safer defaults when a CLI touches secrets, auth, or sensitive systems.
$ npx skills add https://github.com/supercent-io/skills-template --skill security-best-practicesUse grype together with the Security Best Practices skills.sh skill. Start with inspection or dry-run commands, summarize any risk, and ask before actions with side effects.
Why this tool
- grype fits infra well, especially for vulnerability scanning, sbom analysis, and policies from the terminal.
- It is the official CLI from Anchore.
- Good for scripts and agents.
Watch-outs
- Run the verify command first.
Example workflow
1. grype dir:.Safe start
Install grype.
Run `grype --version` first.
Start with `grype dir:.`.
Install the infra CLI and verify kubeconfig, Docker context, or cloud credentials.