
DevOps Explained: Development & Operations Integration Guide
CodeLucky
Learn how to install, configure, run and report vulnerabilities with Vuls — the open-source, agentless vulnerability scanner for Linux/FreeBSD/containers. Commands, config.toml examples, and reporting options included. Are you looking for a powerful, open-source vulnerability scanner for your Linux servers? 🛡️ In this step-by-step Vuls tutorial, we’ll walk through everything you need to know — from installation and configuration to running your first scan and analyzing results. Whether you’re a system administrator, DevSecOps engineer, or a cybersecurity beginner, this guide will help you automate vulnerability management with Vuls — one of the best free tools for keeping your systems secure. # STEP 1 Example: install via apt (Ubuntu example) sudo apt update sudo apt install -y wget git # download vuls binary (replace with latest release) wget https://github.com/future-architect/vuls/releases/download/vX.Y.Z/vuls_linux_amd64.tar.gz tar xzf vuls_linux_amd64.tar.gz sudo mv vuls /usr/local/bin/ # STEP 2 git clone https://github.com/kotakanbe/goval-dictionary.git cd goval-dictionary && make install git clone https://github.com/kotakanbe/go-cve-dictionary.git cd go-cve-dictionary && make install # STEP 3 Example config.toml (shown below): [servers] [servers.localhost] host = "127.0.0.1" port = "local" user = "root" keyPath = "/root/.ssh/id_rsa" scanMode = "fast" # fast | fast-root | deep [servers.remote1] host = "10.0.0.10" port = "22" user = "vuls" keyPath = "/home/vuls/.ssh/id_rsa" scanMode = "fast-root" (Adjust user/keyPath and modes per target.) # STEP 4 “Now run a scan. For local scan:” # basic scan vuls scan # scan and specify report generation later vuls scan -c config.toml “For remote servers (via SSH) ensure the scan user can run the commands Vuls needs and has key-based SSH.” “After vuls scan you get raw JSON results. Use vuls report to create human-readable output, TUI or links for VulsRepo, and you can send reports to Slack/Email/ChatWork.” Example: generate a report and send to email for CVEs CVSS 7 vuls report -to-email -cvss-over=7 open TUI: vuls tui Q: What is Vuls? — A: Open-source agentless vuln scanner for Linux/FreeBSD. GitHub Q: Does Vuls need root? — A: fast mode can run non-root; fast-root/deep need root to get deeper info. HAPPY HACKING #cybersecurity #cybersecurity2025 #hackprotech #informationsecurity #hackingtools #computersecurity #informationsecurity #informationtechnology #tools #cyberattack #scanning #vulnerabilitymanagement digitalocean.com Q: How do I update CVE DBs? — A: Install and run go-cve-dictionary / goval-dictionary update commands (see docs). Medium Q: Can Vuls scan containers? — A: Yes — Vuls supports container/library scans (see vulsctl/docker tutorials). vuls.io Q: Where are results stored? — A: JSON in Vuls data directory and human reports via vuls report / VulsRepo. vuls.io Q: How to integrate with Slack/Email? — A: Configure the Report section in config.toml and call vuls report -to-slack etc. vuls.io Q: Is Vuls safe to run in production? — A: Yes if configured correctly; use fast for routine scans and reserve deep for maintenance windows. digitalocean.com Q: Where’s the web UI? — A: VulsRepo provides a dashboard; install it via vulsctl/Docker or separately. vuls.io +1 Q: Which distros supported? — A: Many (Ubuntu, Debian, RHEL/CentOS, Amazon Linux, FreeBSD). Check docs for distro-specific preqs. vuls.io +1 Q: Is Vuls actively maintained? — A: Yes — see GitHub repo and recent docs/releases. GitHub +1 Sources (quick) Official Vuls docs & tutorials, GitHub, DigitalOcean tutorial, Scaleway tutorial and reports examples. Key references used in this guide