These examples assume you have already installed and authenticated the CLI. If not, start with Installation and Authentication.
Security audit
Connect a cloud provider, run scans, review critical findings, and apply a remediation:Cost optimization
Pull billing data, identify anomalies and savings opportunities, and apply a recommendation:Compliance assessment
Enable a compliance framework, run an assessment, and export the report:Kubernetes scanning
Register a cluster, sync its resources, and inspect workloads:IaC drift detection
Upload a Terraform file and compare it against live infrastructure:JSON scripting with jq
Use-o json with jq to filter, transform, and count results in scripts: