LinuxCommandLibrary
GitHubF-DroidGoogle Play Store

bun-audit

Scan dependencies for known security vulnerabilities

TLDR

Audit dependencies for security vulnerabilities
$ bun audit
copy
Only report high and critical vulnerabilities
$ bun audit --audit-level=high
copy
Audit only production dependencies
$ bun audit --prod
copy
Ignore a specific vulnerability by CVE ID
$ bun audit --ignore [CVE-2023-12345]
copy
Output audit results in JSON format
$ bun audit --json
copy

SYNOPSIS

bun audit [options]

DESCRIPTION

bun audit scans your project's dependencies defined in bun.lock for known security vulnerabilities. It queries the same vulnerability database used by npm audit (GitHub Advisory Database).
The command reports vulnerabilities categorized by severity: low, moderate, high, or critical. It checks direct dependencies, devDependencies, bundledDependencies, and optionalDependencies.

PARAMETERS

--json

Output results in JSON format
--audit-level=level
Minimum severity to report: low, moderate, high, or critical
--prod
Only audit production dependencies, ignoring devDependencies
--ignore CVE
Ignore a specific vulnerability by CVE ID (can be specified multiple times)

CAVEATS

Only catches known, documented vulnerabilities. Does not detect zero-day exploits, malware, misconfigurations, or issues in deeply nested transitive dependencies. A clean audit report does not guarantee complete security. Requires a bun.lock file to be present.

HISTORY

bun audit was introduced in Bun v1.2.15, providing npm audit-compatible security scanning for Bun projects.

SEE ALSO

Copied to clipboard
Kai