AquilaX CLI

AquilaX CLI is a command-line interface for the AquilaX Application Security Platform

Supported Python Versions: 3.6+

Installation

Via PyPI

pip install aquilax

From Source

git clone https://github.com/AquilaX-AI/AquilaX-Client.git
cd AquilaX-Client
pip install -e .

Verification

aquilax --version

Authentication

Login

aquilax login <token>

For self-hosted instances:

aquilax login <token> --server <url>

Parameters:

  • <token>: API authentication token

  • --server: (Optional) Server URL (default: https://aquilax.ai)

Logout

Configuration

Set Default Organization

Set Default Group

Configuration File Location

  • Linux/macOS: ~/.aquilax/config.json

  • Windows: %USERPROFILE%\.aquilax\config.json

Structure:

Available Scanners

Scanner
Function

PII Scanner

Detects personally identifiable information

Secret Scanner

Identifies exposed credentials and API keys

IaC Scanner

Analyzes Infrastructure as Code configurations

SAST Scanner

Static application security testing

SCA Scanner

Software composition analysis for dependencies

Container Scanner

Container security analysis

Image Scanner

Docker image scanning

CI/CD Scanner

Pipeline configuration security review

Commands

scan

Initiate a security scan on a Git repository.

Options:

Flag
Description
Default

--scanners

Scanners to execute

All scanners

--branch

Target branch

main

--sync

Real-time monitoring

Disabled

--format

Output format: json or table

table

Examples:

ci-scan

CI/CD-optimized scanning with policy enforcement.

Options:

Flag
Description
Default

--org-id

Organization ID

Configured default

--group-id

Group ID

Configured default

--branch

Target branch

main

--sync

Real-time monitoring

Disabled

--fail-on-vulns

Exit non-zero if vulnerabilities found

Disabled

--format

Output format: json or table

table

--output-dir

PDF report directory

Current directory

--save-pdf

Save PDF report

Disabled

Examples:

pull

Retrieve scan results by ID.

Options:

Flag
Description
Default

--org-id

Organization ID

Configured default

--group-id

Group ID

Configured default

--format

Output format: json or table

table

Example:

get orgs

List accessible organizations.

get groups

List groups within an organization.

get scan-details

Retrieve detailed scan information.

Options:

Flag
Description
Default

--org-id

Organization ID

Configured default

--group-id

Group ID

Configured default

--format

Output format: json or table

table

Output Formats

Table Format

JSON Format

Security Policy Enforcement

Security policies are configured at the group level. Scans fail when vulnerability counts exceed defined thresholds.

Threshold Types:

  • total: Maximum total vulnerabilities

  • CRITICAL: Maximum critical severity findings

  • HIGH: Maximum high severity findings

  • MEDIUM: Maximum medium severity findings

  • LOW: Maximum low severity findings

Example:

When thresholds are exceeded:

CI/CD Integration

GitHub Actions

GitLab CI

Jenkins

Azure DevOps

Troubleshooting

Module Import Errors

Issue: ModuleNotFoundError: No module named 'aquilax'

Resolution:

Authentication Errors

Issue: 401 Unauthorized

Resolution:

Repository Access Errors

Causes:

  • Incorrect repository URL

  • Insufficient access permissions

  • Invalid branch name

Resolution:

  • Verify repository URL

  • Confirm platform has repository access

  • Check branch exists: git branch -a

Connection Issues

Resolution:

Environment Variables

Support

  • Website: https://aquilax.ai

  • Documentation: https://docs.aquilax.ai

  • Issues: https://github.com/AquilaX-AI/AquilaX-Client/issues

AquilaX Sync Scan

More Details

You can simple type aquilax -h for more details or you can visit the open source repo of the CLI here: https://github.com/AquilaX-AI/AquilaX-Clientarrow-up-right

If you find any issue or any suggestion for improvement, we love to hear from you: https://uptime.betterstack.com/report/QK1Vyg2gkGYXXe8YDePQpuyXarrow-up-right

Last updated