Get up and running with HorizonSec security tools in minutes
The fastest way to try HorizonSec is to run ARTEMIS (Static Code Analysis) on your project:
# Using npm
npm install -g @horizonsec/artemis-cli
# Using pip
pip install horizonsec-artemis
# Navigate to your project directory
cd your-project
# Run a comprehensive security scan
artemis scan .
# Generate a detailed report
artemis report
# Or view results in your browser
artemis report --web
π HorizonSec ARTEMIS Security Scanner
π Scanning: ./src (JavaScript, TypeScript)
β±οΈ Completed in 2.3s
π Results Summary:
π΄ Critical: 0
π High: 2
π‘ Medium: 5
π΅ Low: 12
βΉοΈ Info: 3
π Found 7 security issues requiring attention
π View detailed report: artemis report --web
Version control for cloning repositories and managing your codebase
For ARTEMIS and GAIA modules
For DEMETER and HADES modules
Optional, for containerized deployments
Create a .horizonsec.yml file in your project root to customize behavior:
# .horizonsec.yml
version: 1
# Global settings
api_key: ${HORIZONSEC_API_KEY}
output_format: json
fail_on_high: true
# Module-specific configuration
artemis:
languages: [javascript, typescript, python]
exclude_paths:
- node_modules/
- .git/
- dist/
custom_rules:
- rules/security-patterns.yml
demeter:
cloud_providers: [aws, gcp]
regions: [us-east-1, us-west-2]
compliance_frameworks: [cis, soc2]
gaia:
dashboard_port: 8080
webhook_url: https://your-app.com/webhooks/security
HORIZONSEC_API_KEY
Your HorizonSec API key (optional for CLI usage)
HORIZONSEC_CONFIG_PATH
Path to custom configuration file
HORIZONSEC_OUTPUT_FORMAT
Default output format: json, yaml, table
HORIZONSEC_DEBUG
Enable debug logging: true, false
# Scan current directory
artemis scan .
# Scan specific path
artemis scan ./src
# Scan with specific language
artemis scan ./src --language javascript
# .git/hooks/pre-commit
#!/bin/bash
echo "Running security scan..."
artemis scan --staged-only --fail-fast
if [ $? -ne 0 ]; then
echo "β Security issues found"
exit 1
fi
# Scan Terraform files
demeter scan --type terraform ./infrastructure
# Scan live AWS resources
demeter scan --cloud aws --region us-east-1
# Scan Kubernetes manifests
demeter scan --type kubernetes ./k8s
# Generate HTML report
artemis report --format html --output security-report.html
# Export to SARIF format
artemis report --format sarif --output results.sarif
# Send to webhook
artemis report --webhook https://your-app.com/security