
Research
2025 Report: Destructive Malware in Open Source Packages
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.
vuln-checker
Advanced tools
✨🔍 vuln-checker: Search CVEs by CPE product/version with Enhanced SBOM Support
--max-workers) to handle multiple scans efficiently.pip install --upgrade vuln-checker) to stay current with latest vulnerability data and features.Install via pip:
pip install vuln-checker
Or from GitHub:
git clone https://github.com/skm248/vuln-checker.git
cd vuln_checker
pip install -r requirements.txt
pip install .
Run vuln-checker --help to see the full, current set of options. Selected and notable flags implemented in vuln_checker/main.py:
--input-csv : Path to CSV file with product/version rows (mutually exclusive with --products, --cpes-file, --sbom).--products : Product/version mapping string (e.g. jquery:1.11.3,1.11.5 lodash:3.5.0).--cpes-file : File with one CPE per line to look up directly.--sbom : Path to a CycloneDX SBOM (JSON).--fast : Enable faster parallel processing using caching.--max-workers : Number of parallel workers (default: 5).--max-components : Limit number of components processed (useful for quick runs).--skip-search : Skip components without existing CPEs.--update-feeds : Force download of latest NVD JSON feeds (see nvd_feeds/).--force-update : When used with --update-feeds, forces re-download even if feeds are fresh.--feed-dir : Directory containing NVD feeds (default: nvd_feeds).--cache-file : Path to the CVE cache file (default: cve_cache.json).--no-clear-cache : Prevent clearing the CVE cache when running.--migrate-cache : Attempt to migrate/normalize an existing cache file.--severity : Comma-separated severity filter (e.g. Critical,High).--format : Output format (json, csv, html, excel). Default: json.--output : Output filename for reports.--upgrade : Check PyPI for a newer vuln-checker version and, if available, start an upgrade process.--yes : Auto-confirm interactive prompts (used by --upgrade to skip the confirmation prompt).--version : Print the tool version and exit.Notes on --upgrade behavior:
--upgrade is used the tool checks PyPI for the latest release. If a newer version exists, it prints the version and prompts to upgrade (unless --yes is passed).pip install --upgrade --force-reinstall --no-cache-dir --user vuln-checker using the same Python executable; the tool exits after starting the background process. The upgrade will only proceed if the package is installed via pip (it will skip otherwise).Examples:
Single Product via Command-Line:
vuln-checker --products "jquery:1.11.3,1.11.5 lodash:3.5.0" --format html --output custom_report.html
Batch Processing with CSV:
Create a products.csv file with the following format:
products,versions
jquery,1.11.3,1.11.5
lodash,3.5.0
Run:
vuln-checker --input-csv products.csv --format csv --output output.csv
Processes all product/version pairs from the CSV.
Filter by Severity:
vuln-checker --products "jquery:1.11.3,1.11.5" --severity critical,high --format json --output output.json
Specify Output File:
vuln-checker --input-csv products.csv --format html --output custom_report.html
--version
You can now check the current installed version of the vuln-checker tool using:
vuln-checker --version
--upgrade Easily upgrade to the latest version of vuln-checker from PyPI using:
vuln-checker --upgrade
This command will:
To auto-confirm the upgrade (without a prompt), use the --yes flag:
vuln-checker --upgrade --yes
⚠️ If you already have the latest version installed, the tool will skip the upgrade.
This tool supports excluding specific CPE entries from vulnerability scans to help reduce false positives.
Excluded CPEs must be listed (one per line) in a plain text file named excluded_cpes.txt, located in the same directory as main.py.
At startup, the tool automatically loads this file and ignores any CVEs linked to the listed CPEs.
Example:
# Exclude old Netty CPEs due to false positives
cpe:2.3:a:netty:netty:1.2.10:*:*:*:*:*:*:*
excluded_cpes.txt should contain one full CPE string.# are treated as comments and ignored.The vuln-checker tool automatically manages its own data files, NVD feed cache, and logs.
All files are created and stored in the directory where the tool is executed, allowing you to run it from any location without changing your setup.
You can run vuln-checker from any folder.
All generated data (cache, NVD feeds, and logs) will be stored in that same folder.
cd /home/user/<User_Workspace>
vuln-checker
After running, you’ll see several new files and directories created in /home/user/<User_Workspace>.
Location: ./nvd_feeds/
Purpose: Contains downloaded National Vulnerability Database (NVD) JSON feeds used for vulnerability lookups.
nvdcve-1.1-2002.json.gz
nvdcve-1.1-2003.json.gz
...
nvdcve-1.1-2025.json.gz
Behavior:
Location: vuln-checker.log
Purpose: Stores detailed runtime logs for every execution, including loaded feeds, processing steps, and warnings.
Behavior:
[2025-10-17 14:23:11] INFO: NVD feeds loaded (2002–2025)
[2025-10-17 14:23:14] INFO: Cache file cve_cache.json loaded successfully
[2025-10-17 14:23:20] INFO: Scan completed — 0 vulnerabilities found `
To view logs:
cat logs/vuln-checker.log
or open the file directly in your preferred text editor.
--input-csv INPUT_CSV CSV file of products and versions
--products PRODUCTS Products and versions string
--cpes-file CPES_FILE Path to file of CPEs
--sbom SBOM Path to CycloneDX SBOM file (JSON)
--fast Fast mode: parallel processing with caching
--max-workers MAX_WORKERS Number of parallel workers
--max-components MAX_COMPONENTS Limit number of components to process
--skip-search Skip components without existing CPEs
--update-feeds Download the latest NVD JSON feeds
--force-update Force re-download all feeds even if fresh
--feed-dir FEED_DIR Directory for NVD feeds (default: nvd_feeds)
--cache-file CACHE_FILE CVE cache file location
--no-clear-cache Prevent clearing the CVE cache
--migrate-cache Migrate and normalize existing CVE cache
--severity SEVERITY Severity filter (comma separated)
--format json,csv,html,excel
--output OUTPUT Report output filename
--upgrade Upgrade vuln-checker
--yes Auto-confirm prompts
--version show program's version number and exit
Copyright (c) 2025 skm248
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
FAQs
CLI tool to fetch CVEs using NVD Feeds
We found that vuln-checker demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Research
Destructive malware is rising across open source registries, using delays and kill switches to wipe code, break builds, and disrupt CI/CD.

Security News
Socket CTO Ahmad Nassri shares practical AI coding techniques, tools, and team workflows, plus what still feels noisy and why shipping remains human-led.

Research
/Security News
A five-month operation turned 27 npm packages into durable hosting for browser-run lures that mimic document-sharing portals and Microsoft sign-in, targeting 25 organizations across manufacturing, industrial automation, plastics, and healthcare for credential theft.