You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -330,7 +330,7 @@ The Cycode CLI application offers several types of scans so that you can choose
330
330
331
331
To limit the results of the scan to a specific severity threshold, the argument `--severity-threshold` can be added to the scan command.
332
332
333
-
For example the following command will scan the repository for policy violations that have severity of Medium or higher:
333
+
For example, the following command will scan the repository for policy violations that have severity of Medium or higher:
334
334
335
335
`cycode scan --severity-threshold MEDIUM repository ~/home/git/codebase`
336
336
@@ -341,7 +341,7 @@ For example the following command will scan the repository for policy violations
341
341
342
342
To push scan results tied to the [SCA policies](https://docs.cycode.com/docs/sca-policies) found in an SCA type scan to Cycode, add the argument `--monitor` to the scan command.
343
343
344
-
For example the following command will scan the repository for SCA policy violations and push them to Cycode platform:
344
+
For example, the following command will scan the repository for SCA policy violations and push them to Cycode platform:
@@ -409,7 +409,7 @@ To execute a full repository scan, execute the following:
409
409
410
410
`cycode scan repository {{path}}`
411
411
412
-
For example, in a scenario in which you want to scan your repository stored in`~/home/git/codebase`. You couldthen execute the following:
412
+
For example, ifyou wanted to scan a repository stored in`~/home/git/codebase`, you could execute the following:
413
413
414
414
`cycode scan repository ~/home/git/codebase`
415
415
@@ -445,7 +445,7 @@ Cycode CLI supports Terraform plan scanning (supporting Terraform 0.12 and later
445
445
446
446
Terraform plan file must be in JSON format (having `.json` extension)
447
447
448
-
If you just have a configuration file you can generate a plan by doing the following:
448
+
If you just have a configuration file, you can generate a plan by doing the following:
449
449
450
450
1. Initialize a working directory that contains Terraform configuration file:
451
451
@@ -525,9 +525,9 @@ The result would then not be obfuscated.
525
525
526
526
### Soft Fail
527
527
528
-
In normal operation the CLI will return an exit code of `1` when issues are found in the scan results. Depending on your CI/CD setup this will usually result in an overall failure. However, if you dont want this to happen you can use the soft fail feature.
528
+
In normal operation the CLI will return an exit code of `1` when issues are found in the scan results. Depending on your CI/CD setup this will usually result in an overall failure. If you don't want this to happen, you can use the soft fail feature.
529
529
530
-
By adding the `--soft-fail` option to any type of scan, the exit code will be forced to `0` regardless of if any results are found or not.
530
+
By adding the `--soft-fail` option to any type of scan, the exit code will be forced to `0` regardless of whether any results are found.
0 commit comments