vulnq is a lightweight, multi-source vulnerability query tool that consolidates security data from multiple vulnerability databases. It accepts various software identifiers (PURLs, CPEs, hashes) and returns comprehensive vulnerability information including CVEs, severity scores, and available fixes.
- Multiple ID Formats - Accepts PURLs, CPE strings, and file hashes
- Multi-Source Aggregation - Queries OSV.dev, GitHub Advisory, NIST NVD, and more
- Smart Format Detection - Auto-detects input format or accepts explicit flags
- Upgrade Path Suggestions - Identifies fixed versions when available
- Lightweight - API-only design, no local vulnerability databases
- Flexible Output - JSON, table, and markdown formats
pip install vulnqFor development:
git clone https://github.com/SemClone/vulnq.git
cd vulnq
pip install -e .# Query using Package URL (auto-detected)
vulnq pkg:npm/express@4.17.1
# Query using CPE string (example: Apache Log4j)
vulnq --cpe "cpe:2.3:a:apache:log4j:2.14.0:*:*:*:*:*:*:*"
# Note: Hash-based queries are not currently supported by vulnerability databases
# Query multiple identifiers from file
vulnq --input packages.txt
# Filter by severity
vulnq pkg:pypi/django@3.2.1 --min-severity high
# Output as JSON
vulnq pkg:gem/rails@6.0.0 --format json
# Include fixed versions only
vulnq pkg:maven/org.apache.logging.log4j/log4j-core@2.14.1 --show-fixesfrom vulnq import VulnerabilityQuery
# Initialize the query engine
vq = VulnerabilityQuery()
# Query by PURL
results = vq.query("pkg:npm/express@4.17.1")
# Query by CPE
results = vq.query_cpe("cpe:2.3:a:apache:log4j:2.14.0:*:*:*:*:*:*:*")
# Note: Hash queries are not currently supported by vulnerability databases
# Future versions may support this through file-to-package mapping services
# Process results
for vuln in results.vulnerabilities:
print(f"{vuln.id}: {vuln.severity} - {vuln.summary}")
if vuln.fixed_versions:
print(f" Fixed in: {', '.join(vuln.fixed_versions)}")- OSV.dev - Google's Open Source Vulnerability database
- GitHub Advisory Database - GitHub Security Advisories
- NIST NVD - National Vulnerability Database
- FIRST.org - Forum of Incident Response and Security Teams (planned)
- Sonatype OSS Index - Component vulnerability data (planned)
pkg:npm/package@versionpkg:pypi/package@versionpkg:maven/group/artifact@versionpkg:gem/package@versionpkg:cargo/package@versionpkg:nuget/package@versionpkg:golang/module@version
cpe:2.3:a:vendor:product:version:*:*:*:*:*:*:*cpe:/a:vendor:product:version(legacy format)
- SHA256
- SHA1
- MD5
vulnq can be configured via environment variables or config file:
# API Keys (optional, for higher rate limits)
export GITHUB_TOKEN="your_github_token"
export NVD_API_KEY="your_nvd_api_key"
# Cache settings
export VULNQ_CACHE_DIR="~/.vulnq/cache"
export VULNQ_CACHE_TTL="3600" # seconds
# Rate limiting
export VULNQ_MAX_CONCURRENT="5"vulnq is designed to work seamlessly with other SEMCL.ONE tools:
# Pipe PURLs from src2purl to vulnq
src2purl /path/to/project | vulnq --format json
# Check vulnerabilities for detected packages
upmex /path/to/package.json | vulnq --min-severity critical
# Generate vulnerability report from SBOM
cat sbom.json | vulnq --input - --format markdown > vulns.md┌──────────────┬──────────┬──────────┬─────────────────┬──────────────┐
│ CVE │ Severity │ CVSS │ Package │ Fixed In │
├──────────────┼──────────┼──────────┼─────────────────┼──────────────┤
│ CVE-2021-1234│ HIGH │ 7.5 │ express@4.17.1 │ 4.17.2 │
│ CVE-2021-5678│ CRITICAL │ 9.8 │ express@4.17.1 │ 4.18.0 │
└──────────────┴──────────┴──────────┴─────────────────┴──────────────┘
{
"query": "pkg:npm/express@4.17.1",
"vulnerabilities": [
{
"id": "CVE-2021-1234",
"severity": "HIGH",
"cvss_score": 7.5,
"summary": "Remote Code Execution...",
"fixed_versions": ["4.17.2", "4.18.0"],
"references": [...]
}
],
"metadata": {
"sources": ["osv", "github", "nvd"],
"query_time": "2024-11-04T10:30:00Z"
}
}# Run all tests
pytest
# Run with coverage
pytest --cov=vulnq tests/
# Run specific test
pytest tests/test_osv_client.py -v# Build package
python -m build
# Install locally for testing
pip install -e .We welcome contributions! Please see CONTRIBUTING.md for details.
vulnq is released under the Apache License 2.0. See LICENSE for details.
- Issues: GitHub Issues
- Discussions: GitHub Discussions
- Security: Report vulnerabilities to security@semcl.one
Part of the SEMCL.ONE Software Composition Analysis toolchain