
Product
Reachability for Ruby Now in Beta
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.
@stoplight/cli
Advanced tools

# Install the Stoplight CLI
npm install -g @stoplight/cli
# Output a list of commands
stoplight --help
stoplight push --help
Usage: stoplight push [options]
Analyzes a directory of files and pushes the APIs, models, and docs to Stoplight
Options:
--ci-token <ciToken> project ci token
-b, --branch <branch> project branch name
-d, --directory <directory> directory to analyze and push to stoplight
--url <url> stoplight installation (default: "https://stoplight.io")
--verbose enable detailed logging
--dry-run output analyzes result without pushing to stoplight
-h, --help output usage information
It is possible to let the CLI go through a proxy by setting the HTTP_PROXY env variable.
# Build the CLI commands
yarn build
# To
yarn cli push --directory ../../path/to/repo --url http://stoplight-local.com:8080 --ci-token 123 --branch main
Note: ts-node cannot be used because of fancy webworker stuff.
When releasing a new version of stoplight cli, use standard semver 2.0.0 versioning
MAJOR version when you make incompatible API changes
MINOR version when you add functionality in a backwards compatible manner
PATCH version when you make backwards compatible bug fixes
All changes to stoplight cli should result in a version bump.
If you need help using the CLI or have a support question, please use the Stoplight Community forum.
If you have a bug or feature request, please reach out to Stoplight support at support@stoplight.io.
FAQs
Stoplight CLI
We found that @stoplight/cli demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 3 open source maintainers collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Product
Reachability analysis for Ruby is now in beta, helping teams identify which vulnerabilities are truly exploitable in their applications.

Research
/Security News
Malicious npm packages use Adspect cloaking and fake CAPTCHAs to fingerprint visitors and redirect victims to crypto-themed scam sites.

Security News
Recent coverage mislabels the latest TEA protocol spam as a worm. Here’s what’s actually happening.