Tork CLI Tool
Scan MCP configurations for security vulnerabilities, validate policies, and integrate governance checks into your CI/CD pipelines.
Security Scanning
Detect vulnerabilities in configs
Policy Validation
Validate governance policies
Multiple Formats
Text, JSON, SARIF output
CI/CD Ready
GitHub Actions, GitLab CI
Installation
Install the Tork CLI from PyPI.
The CLI is included with the tork-governance package.
Available Commands
tork scan
Scan MCP configurations for security vulnerabilities.
Options
| -o, --output | Output format: text, json, sarif (default: text) |
| -s, --severity | Minimum severity: critical, high, medium, low, info |
| -v, --verbose | Enable verbose output with recommendations |
Exit Codes
Exits with code 1 if critical or high severity findings are detected. Use this for CI/CD gates.
Output Formats
Choose the output format that fits your workflow.
tork policy
Validate governance policy files.
tork init
Initialize a new policy directory with templates.
Programmatic Evaluation
Use the Python SDK for real-time content evaluation.
For runtime governance in your applications, use the GovernanceEngine directly.
Batch Processing
Scan multiple projects or files programmatically.
CI/CD Integration
Integrate security scanning into your pipelines
Custom Security Rules
Extend the scanner with your own security rules.
Create custom rules by extending SecurityRule to detect organization-specific security issues.
Severity Levels
Best Practices
Run scans on every PR
Catch security issues before they reach main branch.
Use SARIF for GitHub integration
Upload results to GitHub Code Scanning for inline annotations.
Set severity thresholds
Block merges on critical/high, warn on medium/low.
Add pre-commit hooks
Catch issues locally before pushing to remote.
Store scan results as artifacts
Keep historical records for compliance and auditing.
Next Steps
Configure policies in the dashboard and explore SDK integrations.