Run it locally
Install the CLI, scan a small service, and confirm findings before wiring anything into shared automation.
npm install -g cogniumcognium scan ./src- Review source-to-sink traces
A focused developer hub for getting Cognium into local scans, CI, benchmark runs, framework rules, and community contributions.
Each path maps to a concrete developer outcome: a local scan, a CI signal, a reproduced benchmark, or a contribution that expands coverage.
Install the CLI, scan a small service, and confirm findings before wiring anything into shared automation.
npm install -g cogniumcognium scan ./srcEmit SARIF in CI, publish findings into code scanning, and start with high-severity policies before broad rollout.
Add framework sources, sinks, and sanitizers in YAML so Cognium understands your stack and reduces review noise.
Cognium should be evaluated the way developers evaluate infrastructure: install it, inspect it, run it against known cases, and compare the evidence.
1. Install the CLI from npm 2. Scan a known vulnerable fixture 3. Review the taint trace and SARIF output 4. Compare against OWASP, Juliet, and SecuriBench 5. Open issues or discussions for gaps
Bring the use case to the forums so maintainers and contributors can route it to docs, an issue, or a framework rule proposal.