Great article. I love the breakdown. Thanks for sharing!
A small remark on authenticating the CLI.
Although your way definitely works, the preferred way of authenticating is:
snyk auth (will open a browser and let you sign in)
snyk auth token sets the preferred token in your configuration
Alternatively, you can also set an environment variable SNYK_TOKEN containing the token. This way, you do not need to run anything at all. This is super useful we automating CLI scanning in a CI pipeline, for instance.
Log in to continue
The place for Snyk users & security enthusiasts to share their experience and learn from each other.
Hi Lukonde.
Great article. I love the breakdown. Thanks for sharing!
A small remark on authenticating the CLI.
Although your way definitely works, the preferred way of authenticating is:
snyk auth
(will open a browser and let you sign in)snyk auth token
sets the preferred token in your configuration Alternatively, you can also set an environment variableSNYK_TOKEN
containing the token. This way, you do not need to run anything at all. This is super useful we automating CLI scanning in a CI pipeline, for instance.