EresusSecurity
CLI Reference

CLI Reference

Sentinel CLI commands use the same interface for local analysis, project scanning, compliance checks, and CI reporting.

Definition

The Sentinel CLI brings model artifact, prompt firewall, SAST, MCP/agent, supply-chain, red team/eval, dashboard, and proxy workflows into one command-line interface.

Commands

CommandUse case
sentinel scanFull project scan
sentinel artifactModel file and model directory scan
sentinel firewallPrompt, input, and output guardrail checks
sentinel sastStatic source analysis
sentinel secrets-scanSecret and PII traces
sentinel agentAgent manifest and tool permission validation
sentinel mcp scanMCP manifest, HTTP JSON-RPC, or stdio live scan
sentinel supply-chainDependency, provenance, and OSV-backed supply-chain audit
sentinel hf-guardHuggingFace repository pre-download security check
sentinel redteamLLM red team probes and detectors
sentinel evaluateConfig-driven evals and assertions
sentinel dashboardStart the web UI dashboard
sentinel serveStart the REST API server
sentinel proxyInspect runtime traffic with MCP/HTTP proxy mode
sentinel doctorInstallation and scanner health check
sentinel complianceFramework checks such as OWASP LLM

Common flags

In enterprise usage, the same command should behave consistently locally and in CI. Make output format, file path, severity threshold, and policy file explicit.

FlagWhen to use it
-f, --formatChoose SARIF, JSON, JUnit, CSV, HTML, or Markdown.
-o, --outputWrite a CI artifact or security report file.
--ruleRetest a specific category or rule family.
--policyVersion release-gate thresholds inside the repository.

Outputs

Use Markdown/HTML for humans, SARIF/JUnit for CI, and JSON/CSV for automation.

  • SARIFGitHub code scanning and security dashboard workflows.
  • JUnitShow release gates as CI test reports.
  • JSONSIEM, ticketing, or custom automation integrations.
  • Markdown/HTMLReadable customer or executive report output.

Exit codes and gate logic

The goal in CI is not to break builds for every finding. A good first policy is simple: CRITICAL/HIGH breaks the build, MEDIUM opens an issue, and LOW/INFO stays in the report.

Examples

sentinel scan ./project/ -f json -o sentinel-report.json
sentinel artifact ./models/ -f sarif -o report.sarif
sentinel compliance check . --framework owasp-llm
Retest a specific rule
sentinel artifact ./models/ --rule PICKLE
sentinel sast ./src/ --rule JINJA2
sentinel-report.json
{
  "summary": { "critical": 1, "high": 2, "medium": 4 },
  "findings": [{
    "rule_id": "PICKLE-EXEC",
    "severity": "CRITICAL",
    "evidence": "GLOBAL os.system",
    "fix_hint": "Convert the artifact to a non-executable format."
  }]
}