Lines Matching +full:dry +full:- +full:run
1 .TH "NPM\-AUDIT" "1" "April 2022" "" ""
3 \fBnpm-audit\fR \- Run a security audit
8 npm audit [\-\-json|\-\-parseable|\-\-audit\-level=(low|moderate|high|critical)]
9 npm audit fix [\-\-force|\-\-package\-lock\-only|\-\-dry\-run]
11 common options: [\-\-production] [\-\-only=(dev|prod)]
30 $ npm audit fix \-\-package\-lock\-only
38 $ npm audit fix \-\-only=prod
42 Have \fBaudit fix\fP install semver\-major updates to toplevel dependencies, not just
43 semver\-compatible ones:
47 $ npm audit fix \-\-force
51 Do a dry run to get an idea of what \fBaudit fix\fP will do, and \fIalso\fR output
56 $ npm audit fix \-\-dry\-run \-\-json
73 $ npm audit \-\-json
83 $ npm audit \-\-parseable
91 $ npm audit \-\-parseable | awk \-F $'\\t' '{print $1,$4}'
99 $ npm audit \-\-audit\-level=moderate
113 runs a full\-fledged \fBnpm install\fP under the hood, all configs that apply to the
114 installer will also apply to \fBnpm install\fP \-\- so things like \fBnpm audit fix
115 \-\-package\-lock\-only\fP will work as expected\.
117 By default, the audit command will exit with a non\-zero code if any vulnerability
118 is found\. It may be useful in CI environments to include the \fB\-\-audit\-level\fP parameter
133 A scrubbed version of your package\-lock\.json or npm\-shrinkwrap\.json
140 versions) replaced with opaque non\-reversible identifiers\. It is done for
144 Any module referencing a scope that is configured for a non\-default
145 registry has its name scrubbed\. (That is, a scope you did a \fBnpm login \-\-scope=@ourscope\fP f…
155 The non\-reversible identifiers are a sha256 of a session\-specific UUID and the
162 If vulnerabilities were found the exit code will depend on the \fBaudit\-level\fP
169 npm help package\-locks