Terminal (Default)
Use Case: Interactive development, local scans, debuggingFeatures
- ANSI Colors: Severity-coded icons and bars (red=critical, yellow=medium, etc.)
- Severity Dashboard: Horizontal bar chart of findings by severity
- Grouped by File: Findings organized by file path
- Top Files Chart: Most-affected files ranked by finding count
- Preview Text: Matched text snippet for each finding
- Code Block Tags:
[code]marker for findings in fenced code blocks - Confidence Scores:
[85%]shown with--verbose
Flags
JSON
Use Case: Machine processing, custom tooling, API integration, dashboardsSchema
Root Object
| Field | Type | Description |
|---|---|---|
findings | Finding[] | Array of all findings |
files_scanned | int | Number of files analyzed |
rules_loaded | int | Number of active detection rules |
duration_ms | int | Scan duration in milliseconds |
Finding Object
| Field | Type | Description |
|---|---|---|
rule_id | string | Rule identifier (e.g., PROMPT_INJECTION_001) |
rule_name | string | Human-readable rule name |
severity | int | 0=INFO, 1=LOW, 2=MEDIUM, 3=HIGH, 4=CRITICAL |
category | string | Rule category (e.g., prompt-injection) |
description | string | Rule description |
file_path | string | Relative path to file |
line | int | Line number (1-indexed) |
column | int | Column number (0-indexed) |
matched_text | string | Text that triggered the rule |
context | ContextLine[] | Surrounding lines |
score | float | Risk score (0-100) |
analyzer | string | pattern, nlp-injection, toxicflow, or rugpull |
in_code_block | bool | True if inside markdown code fence |
confidence | float | Confidence score (0.0-1.0) |
remediation | string | Fix guidance (optional) |
ContextLine Object
| Field | Type | Description |
|---|---|---|
line | int | Line number |
content | string | Line text |
is_match | bool | True if this is the matched line |
Save to File
SARIF
Use Case: GitHub Code Scanning, IDE integrations, SAST dashboardsSARIF 2.1.0 Compliance
Aguara outputs valid SARIF 2.1.0 for:- GitHub Code Scanning: Upload with
actions/upload-sarif - GitLab SAST: Store as artifact in
sastreport type - Visual Studio: Load into Error List
- VS Code: Render with SARIF Viewer extension
Severity Mapping
| Aguara Severity | SARIF Level |
|---|---|
| CRITICAL | error |
| HIGH | warning |
| MEDIUM | note |
| LOW | note |
| INFO | none |
GitHub Code Scanning
Upload SARIF results to GitHub Security tab:Markdown
Use Case: GitHub Actions job summaries, PR comments, documentationGitHub Actions Job Summary
Render Markdown output in the Actions summary:PR Comments
Post scan results as a PR comment:Format Comparison
| Format | Best For | Size | Structured | Human-Readable |
|---|---|---|---|---|
| Terminal | Local dev, debugging | N/A | No | ✅ |
| JSON | APIs, dashboards, custom tools | Medium | ✅ | No |
| SARIF | GitHub Code Scanning, IDEs | Large | ✅ | No |
| Markdown | PR comments, job summaries | Small | Semi | ✅ |
Writing to Files
All formats support-o / --output:
Filtering Output
Combine--severity to reduce noise:
Exit Codes with —fail-on
Control exit code based on severity:Related
- Incremental Scanning — Scan only changed files
- Rug-Pull Detection — Track changes across scans
- MCP Discovery — Auto-detect and scan MCP configs
