The 'audit' command of the 'npm' tool is a built-in security feature to Node Package Manager. It checks the current version of the installed packages in your project against known vulnerabilities reported on the public npm registry. If it discovers a security issue, it reports it.
|Security Stage||SCA (Software Composition Analysis)|
|Languages||Node Package Manager|
|1||You'll need a Git address to scan|
Adding npm audit to your set of security tests is simple. You will add this testing tool to a version (security stage) that is set up to run static code analysis tests.
Now any time you click 'Test Now' with that ToolKit, or make a request over the Uleska API or CLI with that ToolKit, the 'npm audit' tool will be included in the test run and any results added to your vulnerabilities list.
Currently, the 'npm audit' adaptor will run the default set of tests, recursively going through the files in the codeline. Configuration for audit levels are not currently supported but will be included in a future release.