Skip to content

actx audit

Run static analysis on a plugin directory containing an actx-plugin.yaml manifest. Detects potentially dangerous API calls, filesystem access, and network operations before you install a third-party plugin.

Terminal window
actx audit <pluginPath>
ArgumentRequiredDescription
pluginPathYesPath to the plugin directory containing actx-plugin.yaml

The audit command reads the plugin’s manifest to identify the declared entry file, then runs the StaticAnalyzer against its source code. Each detected threat is assigned a severity score (0–10). If any threat scores ≥ 8, the audit fails with a non-zero exit code — suitable for CI/CD gating.

Terminal window
$ actx audit ./plugins/my-tool
🔍 Auditing Plugin: my-tool v1.0.0
📄 Entry: index.js
--------------------------------------------------
⚠️ [NETWORK] (Score: 5) - Line 12
Outbound HTTP request to external endpoint
Evidence: fetch("https://external-api.com/...")
Static Analysis Passed (Max Threat Score: 5)
CodeMeaning
0All checks passed (max threat score < 8)
1Audit failed — critical threat detected, or manifest/entry file not found