InSpec CLI

Use the InSpec CLI to run tests and audits against targets using local, SSH, WinRM, or Docker connections.

archive

Archive a profile to tar.gz (default) or zip

Syntax

This subcommand has the following syntax:

$ inspec archive PATH

Options

This subcommand has additional options:

  • --ignore-errors, --no-ignore-errors
    Ignore profile warnings.
  • -o, --output=OUTPUT
    Save the archive to a path
  • --overwrite, --no-overwrite
    Overwrite existing archive.
  • --profiles-path=PROFILES_PATH
    Folder which contains referenced profiles.
  • --tar, --no-tar
    Generates a tar.gz archive.
  • --vendor-cache=VENDOR_CACHE
    Use the given path for caching dependencies. (default: ~/.inspec/cache)
  • --zip, --no-zip
    Generates a zip archive.

check

Verify all tests at the specified path

Syntax

This subcommand has the following syntax:

$ inspec check PATH

Options

This subcommand has additional options:

  • --format=FORMAT

  • --profiles-path=PROFILES_PATH
    Folder which contains referenced profiles.

  • --vendor-cache=VENDOR_CACHE
    Use the given path for caching dependencies. (default: ~/.inspec/cache)

detect

Detect the target os

Syntax

This subcommand has the following syntax:

$ inspec detect

Options

This subcommand has additional options:

  • -b, --backend=BACKEND
    Choose a backend: local, ssh, winrm, docker.
  • --bastion-host=BASTION_HOST
    Specifies the bastion host if applicable
  • --bastion-port=BASTION_PORT
    Specifies the bastion port if applicable
  • --bastion-user=BASTION_USER
    Specifies the bastion user if applicable
  • --config=CONFIG
    Read configuration from JSON file (- reads from stdin).
  • --enable-password=ENABLE_PASSWORD
    Password for enable mode on Cisco IOS devices.
  • --format=FORMAT

  • --host=HOST
    Specify a remote host which is tested.

  • --insecure, --no-insecure
    Disable SSL verification on select targets

  • -i, --key-files=one two three
    Login key or certificate file for a remote scan.

  • --password=PASSWORD
    Login password for a remote scan, if required.

  • --path=PATH
    Login path to use when connecting to the target (WinRM).

  • -p, --port=N
    Specify the login port for a remote scan.

  • --proxy-command=PROXY_COMMAND
    Specifies the command to use to connect to the server

  • --self-signed, --no-self-signed
    Allow remote scans with self-signed certificates (WinRM).

  • --shell, --no-shell
    Run scans in a subshell. Only activates on Unix.

  • --shell-command=SHELL_COMMAND
    Specify a particular shell to use.

  • --shell-options=SHELL_OPTIONS
    Additional shell options.

  • --ssl, --no-ssl
    Use SSL for transport layer encryption (WinRM).

  • --sudo, --no-sudo
    Run scans with sudo. Only activates on Unix and non-root user.

  • --sudo-command=SUDO_COMMAND
    Alternate command for sudo.

  • --sudo-options=SUDO_OPTIONS
    Additional sudo options for a remote scan.

  • --sudo-password=SUDO_PASSWORD
    Specify a sudo password, if it is required.

  • -t, --target=TARGET
    Simple targeting option using URIs, e.g. ssh://user:pass@host:port

  • --target-id=TARGET_ID
    Provide a ID which will be included on reports

  • --user=USER
    The login user for a remote scan.

  • --winrm-basic-auth, --no-winrm-basic-auth
    Whether to use basic authentication, defaults to false (WinRM).

  • --winrm-disable-sspi, --no-winrm-disable-sspi
    Whether to use disable sspi authentication, defaults to false (WinRM).

  • --winrm-transport=WINRM_TRANSPORT
    Specify which transport to use, defaults to negotiate (WinRM).

env

Output shell-appropriate completion configuration

Syntax

This subcommand has the following syntax:

$ inspec env

exec

Run all test files at the specified locations.

loads the given profile(s) and fetches their dependencies if needed. then connects to the target and executes any controls contained in the profiles. one or more reporters are used to generate output.

exit codes:
    0  normal exit, all tests passed
    1  usage or general error
    2  error in plugin system
    3  fatal deprecation encountered
  100  normal exit, at least one test failed
  101  normal exit, at least one test skipped but none failed
  172  chef license not accepted

below are some examples of using exec with different test locations:

automate: inspec compliance login inspec exec compliance://username/linux-baseline

supermarket: inspec exec supermarket://username/linux-baseline

local profile (executes all tests in controls/): inspec exec /path/to/profile

local single test (doesn’t allow inputs or custom resources) inspec exec /path/to/a_test.rb

git via ssh inspec exec git@github.com:dev-sec/linux-baseline.git

git via https (.git suffix is required): inspec exec https://github.com/dev-sec/linux-baseline.git

private git via https (.git suffix is required): inspec exec https://api_token@github.com/dev-sec/linux-baseline.git

private git via https and cached credentials (.git suffix is required): git config credential.helper cache git ls-remote https://github.com/dev-sec/linux-baseline.git inspec exec https://github.com/dev-sec/linux-baseline.git

web hosted fileshare (also supports .zip): inspec exec https://webserver/linux-baseline.tar.gz

web hosted fileshare with basic authentication (supports .zip): inspec exec https://username:password@webserver/linux-baseline.tar.gz

Syntax

This subcommand has the following syntax:

$ inspec exec LOCATIONS

Options

This subcommand has additional options:

  • --attrs=one two three
    Legacy name for –input-file - deprecated.
  • -b, --backend=BACKEND
    Choose a backend: local, ssh, winrm, docker.
  • --backend-cache, --no-backend-cache
    Allow caching for backend command output. (default: true)
  • --bastion-host=BASTION_HOST
    Specifies the bastion host if applicable
  • --bastion-port=BASTION_PORT
    Specifies the bastion port if applicable
  • --bastion-user=BASTION_USER
    Specifies the bastion user if applicable
  • --config=CONFIG
    Read configuration from JSON file (- reads from stdin).
  • --controls=one two three
    A list of control names to run, or a list of /regexes/ to match against control names. Ignore all other tests.
  • --create-lockfile, --no-create-lockfile
    Write out a lockfile based on this execution (unless one already exists)
  • --distinct-exit, --no-distinct-exit
    Exit with code 101 if any tests fail, and 100 if any are skipped (default). If disabled, exit 0 on skips and 1 for failures.
  • --enable-password=ENABLE_PASSWORD
    Password for enable mode on Cisco IOS devices.
  • --host=HOST
    Specify a remote host which is tested.
  • --input=name1=value1 name2=value2
    Specify one or more inputs directly on the command line, as –input NAME=VALUE
  • --input-file=one two three
    Load one or more input files, a YAML file with values for the profile to use
  • --insecure, --no-insecure
    Disable SSL verification on select targets
  • -i, --key-files=one two three
    Login key or certificate file for a remote scan.
  • --password=PASSWORD
    Login password for a remote scan, if required.
  • --path=PATH
    Login path to use when connecting to the target (WinRM).
  • -p, --port=N
    Specify the login port for a remote scan.
  • --profiles-path=PROFILES_PATH
    Folder which contains referenced profiles.
  • --proxy-command=PROXY_COMMAND
    Specifies the command to use to connect to the server
  • --reporter=one two:/output/file/path
    Enable one or more output reporters: cli, documentation, html, progress, json, json-min, json-rspec, junit, yaml
  • --self-signed, --no-self-signed
    Allow remote scans with self-signed certificates (WinRM).
  • --shell, --no-shell
    Run scans in a subshell. Only activates on Unix.
  • --shell-command=SHELL_COMMAND
    Specify a particular shell to use.
  • --shell-options=SHELL_OPTIONS
    Additional shell options.
  • --show-progress, --no-show-progress
    Show progress while executing tests.
  • --ssl, --no-ssl
    Use SSL for transport layer encryption (WinRM).
  • --sudo, --no-sudo
    Run scans with sudo. Only activates on Unix and non-root user.
  • --sudo-command=SUDO_COMMAND
    Alternate command for sudo.
  • --sudo-options=SUDO_OPTIONS
    Additional sudo options for a remote scan.
  • --sudo-password=SUDO_PASSWORD
    Specify a sudo password, if it is required.
  • -t, --target=TARGET
    Simple targeting option using URIs, e.g. ssh://user:pass@host:port
  • --target-id=TARGET_ID
    Provide a ID which will be included on reports
  • --user=USER
    The login user for a remote scan.
  • --vendor-cache=VENDOR_CACHE
    Use the given path for caching dependencies. (default: ~/.inspec/cache)
  • --waiver-file=one two three
    Load one or more waiver files.
  • --winrm-basic-auth, --no-winrm-basic-auth
    Whether to use basic authentication, defaults to false (WinRM).
  • --winrm-disable-sspi, --no-winrm-disable-sspi
    Whether to use disable sspi authentication, defaults to false (WinRM).
  • --winrm-transport=WINRM_TRANSPORT
    Specify which transport to use, defaults to negotiate (WinRM).

help

Describe available commands or one specific command

Syntax

This subcommand has the following syntax:

$ inspec help [COMMAND]

json

Read all tests in path and generate a json summary

Syntax

This subcommand has the following syntax:

$ inspec json PATH

Options

This subcommand has additional options:

  • --controls=one two three
    A list of controls to include. Ignore all other tests.
  • -o, --output=OUTPUT
    Save the created profile to a path
  • --profiles-path=PROFILES_PATH
    Folder which contains referenced profiles.
  • --vendor-cache=VENDOR_CACHE
    Use the given path for caching dependencies. (default: ~/.inspec/cache)

nothing

Does nothing

Syntax

This subcommand has the following syntax:

$ inspec nothing

schema

Print the json schema

Syntax

This subcommand has the following syntax:

$ inspec schema NAME

shell

Open an interactive debugging shell

Syntax

This subcommand has the following syntax:

$ inspec shell

Options

This subcommand has additional options:

  • -b, --backend=BACKEND
    Choose a backend: local, ssh, winrm, docker.
  • --bastion-host=BASTION_HOST
    Specifies the bastion host if applicable
  • --bastion-port=BASTION_PORT
    Specifies the bastion port if applicable
  • --bastion-user=BASTION_USER
    Specifies the bastion user if applicable
  • -c, --command=COMMAND
    A single command string to run instead of launching the shell
  • --config=CONFIG
    Read configuration from JSON file (- reads from stdin).
  • --depends=one two three
    A space-delimited list of local folders containing profiles whose libraries and resources will be loaded into the new shell
  • --distinct-exit, --no-distinct-exit
    Exit with code 100 if any tests fail, and 101 if any are skipped but none failed (default). If disabled, exit 0 on skips and 1 for failures.
  • --enable-password=ENABLE_PASSWORD
    Password for enable mode on Cisco IOS devices.
  • --host=HOST
    Specify a remote host which is tested.
  • --insecure, --no-insecure
    Disable SSL verification on select targets
  • -i, --key-files=one two three
    Login key or certificate file for a remote scan.
  • --password=PASSWORD
    Login password for a remote scan, if required.
  • --path=PATH
    Login path to use when connecting to the target (WinRM).
  • -p, --port=N
    Specify the login port for a remote scan.
  • --proxy-command=PROXY_COMMAND
    Specifies the command to use to connect to the server
  • --reporter=one two:/output/file/path
    Enable one or more output reporters: cli, documentation, html, progress, json, json-min, json-rspec, junit
  • --self-signed, --no-self-signed
    Allow remote scans with self-signed certificates (WinRM).
  • --shell, --no-shell
    Run scans in a subshell. Only activates on Unix.
  • --shell-command=SHELL_COMMAND
    Specify a particular shell to use.
  • --shell-options=SHELL_OPTIONS
    Additional shell options.
  • --ssl, --no-ssl
    Use SSL for transport layer encryption (WinRM).
  • --sudo, --no-sudo
    Run scans with sudo. Only activates on Unix and non-root user.
  • --sudo-command=SUDO_COMMAND
    Alternate command for sudo.
  • --sudo-options=SUDO_OPTIONS
    Additional sudo options for a remote scan.
  • --sudo-password=SUDO_PASSWORD
    Specify a sudo password, if it is required.
  • -t, --target=TARGET
    Simple targeting option using URIs, e.g. ssh://user:pass@host:port
  • --target-id=TARGET_ID
    Provide a ID which will be included on reports
  • --user=USER
    The login user for a remote scan.
  • --winrm-basic-auth, --no-winrm-basic-auth
    Whether to use basic authentication, defaults to false (WinRM).
  • --winrm-disable-sspi, --no-winrm-disable-sspi
    Whether to use disable sspi authentication, defaults to false (WinRM).
  • --winrm-transport=WINRM_TRANSPORT
    Specify which transport to use, defaults to negotiate (WinRM).

supermarket

Supermarket commands

Syntax

This subcommand has the following syntax:

$ inspec supermarket SUBCOMMAND ...

vendor

Download all dependencies and generate a lockfile in a vendor directory

Syntax

This subcommand has the following syntax:

$ inspec vendor PATH

Options

This subcommand has additional options:

  • --overwrite, --no-overwrite
    Overwrite existing vendored dependencies and lockfile.

version

Prints the version of this tool

Syntax

This subcommand has the following syntax:

$ inspec version

Options

This subcommand has additional options:

  • --format=FORMAT