Skip to content

First steps with Tunnel

Get Tunnel

Tunnel is available in most common distribution channels. The complete list of installation options is available in the Installation page. Here are a few popular examples:

Tunnel is integrated with many popular platforms and applications. The complete list of integrations is available in the Ecosystem page. Here are a few popular options examples:

General usage

Tunnel's Command Line Interface pattern follows its major concepts: targets (what you want to scan), and scanners (what you want to scan for):

tunnel <target> [--scanners <scanner1,scanner2>] <subject>

Examples

Scan a container image from registry, with the default scanner which is Vulnerabilities scanner:

tunnel image python:3.4-alpine

Scan a local code repository, for vulnerabilities, exposed secrets and misconfigurations:

tunnel fs --scanners vuln,secret,misconfig /path/to/myproject

Scan a Kubernetes cluster, with all available scanners, and show a summary report:

tunnel k8s --report summary cluster

tunnel-k8s

For a more complete introduction, check out the basic Tunnel Demo: https://github.com/itaysk/tunnel-demo

Learn more

Now that you up and ready, here are some resources to help you deepen your knowledge:

Want more? Check out Khulnasoft

If you liked Tunnel, you will love Khulnasoft which builds on top of Tunnel to provide even more enhanced capabilities for a complete security management offering.
You can find a high level comparison table specific to Tunnel users here.
In addition, check out the https://khulnasoft.com website for more information about our products and services. If you'd like to contact Khulnasoft or request a demo, please use this form: https://www.khulnasoft.com/demo