hexr audit gives you a security snapshot of your agent at any point — before a push, after a deploy, or on a scheduled CI schedule. It runs three checks in sequence: Python dependency vulnerability scanning via pip-audit, CycloneDX SBOM generation for compliance, and optional drift detection that compares your generated manifests against what’s actually running in the cluster. You can run it standalone or integrate it into your deployment pipeline as a gate.
Usage
Default scan
Runninghexr audit with no flags executes all three checks and prints a consolidated report:
Options
Export the CycloneDX SBOM to a file for use in compliance workflows or artifact storage.
Run drift detection — compare the generated manifests in
.hexr/ against the live Kubernetes state for your tenant namespace. Useful for detecting out-of-band changes or failed partial deployments.Auto-remediate fixable vulnerabilities by updating pinned dependency versions.
What gets audited
| Check | Tool | Description |
|---|---|---|
| Python dependencies | pip-audit | Known CVEs in all installed packages |
| SBOM generation | CycloneDX | Software bill of materials for compliance reporting |
| Container image | Vulnerability scanner | OS-level CVEs in the base image layers |
| Manifest drift | kubectl diff | Live cluster state vs. generated manifests |