Skip to content

vulns

Check for known security vulnerabilities affecting a package version. Queries the OSV (Open Source Vulnerabilities) database.

Usage

peeq vulns <package> [options]

Arguments

Argument Description
package Package name. Required.

Options

Option Type Default Description
--version string latest Specific version to check.

How it works

peeq queries the OSV API for vulnerabilities affecting the specified package in the PyPI ecosystem. The query is scoped to an exact version — it returns only vulnerabilities that affect the version you specify (or the latest version, by default).

Each vulnerability in the report includes:

  • ID — the OSV identifier (typically a GHSA ID).
  • CVE — the associated CVE alias, if one exists.
  • Severity — a severity label (e.g., MODERATE, HIGH) from the advisory database.
  • Summary — a brief description of the vulnerability.
  • Fixed in — the version(s) where the vulnerability was patched.

When vulnerabilities are found, peeq shows a suggested upgrade version that fixes all reported issues.

Caching

Vulnerability data is never cached. peeq always queries the OSV API live to ensure results reflect the latest advisories.

The global --no-cache flag has no effect on the vulnerability query itself; it only affects version resolution when --version is not specified.

No authentication or API keys are required. The OSV API is free and has no rate limits.

Examples

Check the latest version

$ peeq vulns requests
Vulnerabilities for requests 2.33.1:
No known vulnerabilities.

Check an older version

$ peeq vulns requests --version 2.31.0
Vulnerabilities for requests 2.31.0:

ID: GHSA-9hjg-9r4m-mvj7
CVE: CVE-2024-47081
Severity: MODERATE
Summary: Requests vulnerable to .netrc credentials leak via malicious URLs
Fixed in: 2.32.4

ID: GHSA-9wx4-h78v-vm56
CVE: CVE-2024-35195
Severity: MODERATE
Summary: Requests `Session` object does not verify requests after making first request with verify=False
Fixed in: 2.32.0

ID: GHSA-gc5v-m9x4-r6x2
CVE: CVE-2026-25645
Severity: MODERATE
Summary: Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function
Fixed in: 2.33.0

Suggested upgrade: >= 2.33.0

See also

  • info — include a vulnerability scan as part of a broader package report with --vulns or --full.