UNPKG

vaultace-cli

Version:

AI-powered security scanner that detects vulnerabilities in AI-generated code. Proactive scanning, autonomous fixing, and emergency response for modern development teams.

364 lines (262 loc) 7.8 kB
# Installation Guide Get started with Vaultace SecureFlow in minutes. This guide covers installation, initial setup, and verification steps. ## Prerequisites Before installing Vaultace SecureFlow, ensure you have: - **Node.js 18+** (recommended: latest LTS) - **Git** for version control - **Operating System**: Windows, macOS, or Linux - **Network Access**: For downloading dependencies and accessing APIs ## Installation Options ### Option 1: NPM Installation (Recommended) ```bash # Install globally npm install -g vaultace-cli # Verify installation vaultace --version ``` ### Option 2: Build from Source ```bash # Clone the repository git clone https://github.com/vaultace/vaultace-cli.git cd vaultace-cli # Install dependencies npm install # Build the project npm run build # Link locally npm link ``` ### Option 3: Docker Container ```bash # Pull the official image docker pull vaultace/cli:latest # Run with volume mount for persistence docker run -v ~/.vaultace:/root/.vaultace vaultace/cli:latest workflow list ``` ## Initial Setup ### 1. Authentication Setup First, authenticate with the Vaultace platform: ```bash # Login to your Vaultace account vaultace auth login # Or configure API key vaultace config set api-key YOUR_API_KEY ``` ### 2. Workspace Configuration Configure your workspace settings: ```bash # Set default configuration vaultace config set workspace production vaultace config set region us-east-1 # Configure encryption (optional) vaultace config set encryption-enabled true vaultace config set privacy-mode false ``` ### 3. Initialize Workflow Environment ```bash # Initialize SecureFlow vaultace workflow init # This creates: # ~/.vaultace/workflows/ - Workflow storage # ~/.vaultace/workflows/state/ - Encrypted state # ~/.vaultace/secureflow.key - Encryption key ``` ## Verification Verify your installation with these commands: ### System Check ```bash # Run system diagnostics vaultace config check # Expected output: ✅ Authentication: Connected ✅ API Access: Available ✅ Encryption: Enabled ✅ Storage: Initialized ✅ Permissions: Valid ``` ### Test Workflow Creation ```bash # List available templates vaultace workflow templates # Create a test workflow vaultace workflow create --template vulnerability_scan_test # Expected output: ✅ Workflow created: wf_vulnerability_scan_test_1641234567890 Template: vulnerability_scan_test Name: Test Vulnerability Scan Steps: 3 Run with: vaultace workflow run wf_vulnerability_scan_test_1641234567890 ``` ### Test Workflow Execution ```bash # Run the test workflow vaultace workflow run wf_vulnerability_scan_test_1641234567890 # Monitor execution vaultace workflow monitor <execution-id> ``` ## Configuration Options ### Global Settings Edit `~/.vaultace/config.json`: ```json { "apiUrl": "https://api.vaultace.co", "workspace": "production", "region": "us-east-1", "logLevel": "info", "encryption": { "enabled": true, "algorithm": "aes-256-gcm" }, "workflows": { "retentionDays": 30, "maxConcurrentExecutions": 10, "enableAuditLog": true, "privacyMode": false } } ``` ### Environment Variables Common environment variables: ```bash # API Configuration export VAULTACE_API_URL=https://api.vaultace.co export VAULTACE_API_KEY=your_api_key # Logging export VAULTACE_LOG_LEVEL=debug export VAULTACE_VERBOSE=true # Workflow Settings export VAULTACE_ENCRYPTION_KEY=path/to/key export VAULTACE_PRIVACY_MODE=true export VAULTACE_MAX_CONCURRENT=5 ``` ## Security Setup ### Encryption Key Management SecureFlow automatically generates encryption keys, but you can manage them manually: ```bash # Generate new encryption key vaultace workflow key generate # Rotate existing key vaultace workflow key rotate # Backup encryption key (store securely!) cp ~/.vaultace/secureflow.key ~/backup/secureflow-backup.key ``` ### Access Control Configure user permissions: ```bash # Set up role-based access vaultace auth role create security-analyst vaultace auth role assign security-analyst --permissions workflow:read,workflow:execute # Configure API key scoping vaultace auth api-key create --scope workflow:* --expires 90d ``` ### Audit Configuration Enable comprehensive audit logging: ```bash # Enable audit logging vaultace config set audit-enabled true vaultace config set audit-level full # Configure log retention vaultace config set audit-retention-days 365 # Set up log forwarding (optional) vaultace config set audit-siem-url https://your-siem.company.com/api/logs ``` ## Network Configuration ### Proxy Setup If using a corporate proxy: ```bash # HTTP/HTTPS proxy export HTTP_PROXY=http://proxy.company.com:8080 export HTTPS_PROXY=http://proxy.company.com:8080 # Or configure in CLI vaultace config set proxy-url http://proxy.company.com:8080 vaultace config set proxy-auth username:password ``` ### Firewall Rules Ensure these outbound connections are allowed: - **API Access**: `*.vaultace.co:443` (HTTPS) - **Updates**: `registry.npmjs.org:443` (HTTPS) - **Telemetry**: `telemetry.vaultace.co:443` (HTTPS, optional) ## Platform-Specific Setup ### Windows ```powershell # Install via Chocolatey choco install vaultace-cli # Or use PowerShell Set-ExecutionPolicy RemoteSigned -Scope CurrentUser iwr https://install.vaultace.com/windows | iex ``` ### macOS ```bash # Install via Homebrew brew tap vaultace/cli brew install vaultace-cli # Or use installation script curl -fsSL https://install.vaultace.com/macos | bash ``` ### Linux ```bash # Ubuntu/Debian wget -qO- https://packages.vaultace.com/key | gpg --dearmor > vaultace.gpg sudo install -o root -g root -m 644 vaultace.gpg /etc/apt/trusted.gpg.d/ echo "deb https://packages.vaultace.com/apt stable main" | sudo tee /etc/apt/sources.list.d/vaultace.list sudo apt update && sudo apt install vaultace-cli # RHEL/CentOS/Fedora sudo dnf config-manager --add-repo https://packages.vaultace.com/rpm/vaultace.repo sudo dnf install vaultace-cli ``` ## Troubleshooting ### Common Issues **Installation fails with permission errors:** ```bash # Use npm with --unsafe-perm flag npm install -g vaultace-cli --unsafe-perm # Or use a Node version manager nvm use 18 npm install -g vaultace-cli ``` **Authentication failures:** ```bash # Clear cached credentials vaultace auth logout vaultace auth clear-cache # Re-authenticate vaultace auth login --force ``` **Workflow initialization fails:** ```bash # Check permissions ls -la ~/.vaultace/ # Reinitialize rm -rf ~/.vaultace/workflows/ vaultace workflow init --force ``` ### Debug Mode Enable verbose logging for troubleshooting: ```bash # Global debug mode export VAULTACE_DEBUG=true export VAULTACE_LOG_LEVEL=debug # Or per-command vaultace workflow list --verbose --debug ``` ### Support If you encounter issues: 1. **Check logs**: `~/.vaultace/cli.log` 2. **Run diagnostics**: `vaultace config check --verbose` 3. **Community**: [GitHub Issues](https://github.com/vaultace/vaultace-cli/issues) 4. **Documentation**: [Troubleshooting Guide](../guides/troubleshooting.md) ## Next Steps Now that SecureFlow is installed: 1. **[Create Your First Workflow](./first-workflow.md)** - Build a simple security workflow 2. **[Explore Templates](../templates/README.md)** - Browse pre-built security workflows 3. **[Learn Core Concepts](../concepts/README.md)** - Understand SecureFlow architecture 4. **[Configure Monitoring](../guides/monitoring.md)** - Set up observability --- **Quick Commands Reference:** ```bash vaultace --help # Show all commands vaultace workflow templates # List templates vaultace workflow create # Create workflow vaultace workflow list # List workflows vaultace config check # Verify setup ```