Skip to main content

Global Options

These options are available on most commands:
OptionDescription
--quietSuppress banners and decorative output
--no-colorDisable colored/rich output (also auto-detected when piping)
--jsonOutput as JSON (available on enterprise commands)
When piping output (e.g., raxe scan "text" --format json | jq .), ANSI color codes are automatically suppressed.

raxe scan

Scan text for threats.
raxe scan "text to scan"

Options

OptionDescription
--formatOutput format: text, json, yaml, table
--ciCI mode (JSON + exit code 1 on threats)
--explainShow detailed explanations
--ruleTest specific rule only
--tenantTenant ID for multi-tenant scanning
--appApp ID within tenant
--policyOverride policy for this scan
--quietSuppress banners and decorative output
--no-colorDisable colored output

Examples

# Basic scan
raxe scan "Ignore all previous instructions"

# JSON output
raxe scan "text" --format json

# Table output (summary view)
raxe scan "text" --format table

# YAML output
raxe scan "text" --format yaml

# CI mode
raxe scan "text" --ci

# With explanations
raxe scan "text" --explain

# Quiet mode (minimal output)
raxe scan "text" --quiet

# Multi-tenant scanning
raxe scan "text" --tenant acme --app chatbot

# Override policy
raxe scan "text" --tenant acme --policy strict

raxe batch

Scan multiple prompts from file.
raxe batch prompts.txt

Options

OptionDescription
--formatOutput format: text, json, csv
--outputWrite results to file

Examples

# Scan from file
raxe batch prompts.txt

# Output to JSON file
raxe batch prompts.txt --format json --output results.json

# From stdin
cat prompts.txt | raxe batch -

raxe repl

Interactive scanning mode.
raxe repl

REPL Commands

CommandDescription
scan <text>Scan text
rulesList loaded rules
statsShow session stats
clearClear screen
helpShow help
quitExit REPL

raxe rules

Manage detection rules.
raxe rules list
raxe rules show <rule-id>

Subcommands

CommandDescription
listList all rules
show <id>Show rule details
search <query>Search rules

Examples

# List all rules
raxe rules list

# Filter by family
raxe rules list --family PI

# Show specific rule
raxe rules show pi-001

# Search rules
raxe rules search "injection"

raxe doctor

System health check.
raxe doctor

Output

RAXE Health Check

 Configuration file exists
 Rules loaded successfully (515 rules)
 Database initialized
 ML model available
 Telemetry endpoint reachable

System ready!

raxe stats

View scan statistics.
raxe stats

Options

OptionDescription
--periodTime period: today, week, month, all

Output

RAXE Statistics (This Week)

Scans: 1,234
Threats Detected: 56
Detection Rate: 4.5%

Top Rules:
  1. pi-001 (23 detections)
  2. jb-003 (12 detections)
  3. pii-042 (8 detections)

raxe config

Manage configuration.
raxe config show
raxe config set <key> <value>

Subcommands

CommandDescription
showShow current config
set <key> <value>Set config value
resetReset to defaults

Examples

# Show config
raxe config show

# Set log level
raxe config set log_level DEBUG

# Reset config
raxe config reset

raxe init

Initialize RAXE configuration.
raxe init
Creates:
  • ~/.raxe/config.yaml
  • ~/.raxe/raxe.db

raxe mcp

MCP (Model Context Protocol) integration commands.

raxe mcp status

Check MCP integration status including SDK availability, server modules, and Claude Desktop configuration.
raxe mcp status
raxe mcp status --json

Options

OptionDescription
--outputOutput format: table, json
--jsonShorthand for --output json

Example Output

MCP Integration Status

┌──────────────────┬────────────────┐
│ RAXE Version     │ 0.10.2         │
│ MCP SDK          │ Installed      │
│ MCP SDK Version  │ 1.16.0         │
│ Server Module    │ Available      │
│ Gateway Config   │ Not found      │
│ Claude Desktop   │ Not configured │
└──────────────────┴────────────────┘

raxe mcp gateway

Start the MCP Security Gateway to protect MCP servers.
raxe mcp gateway -u "npx @modelcontextprotocol/server-filesystem /tmp"

Options

OptionDescription
-u, --upstreamUpstream MCP server command (required unless using —config)
-c, --configPath to gateway configuration file
--on-threatAction on threat: log, block, warn (default: log)
--severity-thresholdMinimum severity: LOW, MEDIUM, HIGH, CRITICAL (default: HIGH)
--no-l2Disable ML detection for faster scanning
-v, --verboseEnable verbose logging

Examples

# Protect a filesystem server
raxe mcp gateway -u "npx @modelcontextprotocol/server-filesystem /tmp"

# With blocking enabled
raxe mcp gateway -u "npx @modelcontextprotocol/server-filesystem /tmp" --on-threat block

# From config file
raxe mcp gateway --config mcp-security.yaml

# Fast mode (L1 only)
raxe mcp gateway -u "npx @modelcontextprotocol/server-filesystem /tmp" --no-l2

raxe mcp serve

Start the MCP server (RAXE as a tool provider).
raxe mcp serve

Options

OptionDescription
--transportTransport protocol: stdio (default: stdio)
--log-levelLog level: debug, info, warn, error (default: info)
-q, --quietSuppress startup banner

raxe mcp audit

Audit an MCP configuration file for security issues.
raxe mcp audit ~/.config/claude/claude_desktop_config.json

Options

OptionDescription
--jsonOutput results as JSON

Example Output

MCP Configuration Audit

┌──────────┬────────────┬──────────────────────────────────────┬──────────────────────────────────┐
│ Severity │ Server     │ Issue                                │ Recommendation                   │
├──────────┼────────────┼──────────────────────────────────────┼──────────────────────────────────┤
│ CRITICAL │ shell      │ Server has shell execution capabili… │ Use RAXE gateway to monitor      │
│ HIGH     │ filesystem │ Filesystem server has access to se…  │ Restrict to specific directories │
└──────────┴────────────┴──────────────────────────────────────┴──────────────────────────────────┘

raxe mcp generate-config

Generate a sample gateway configuration file.
raxe mcp generate-config

Options

OptionDescription
-o, --outputOutput file path (default: mcp-security.yaml)

raxe completion

Generate shell completion scripts for bash, zsh, or fish.
raxe completion bash
raxe completion zsh
raxe completion fish

Installation

# Bash
raxe completion bash >> ~/.bashrc

# Zsh
raxe completion zsh >> ~/.zshrc

# Fish
raxe completion fish > ~/.config/fish/completions/raxe.fish
Completions are dynamic and automatically discover all 36+ commands and subcommands at runtime.

raxe models

Manage and inspect ML models.
raxe models list
raxe models compare

Subcommands

CommandDescription
listList available ML models
compareCompare model performance
Models are discovered from ~/.raxe/models/ directory. RAXE ships with a default compact Gemma-based classifier.

raxe export

Export scan history.
raxe export --format json --output history.json

Options

OptionDescription
--formatOutput format: json, csv
--outputOutput file path
--sinceExport from date

raxe tenant

Manage tenants for multi-customer deployments.
raxe tenant <subcommand>

Subcommands

CommandDescription
createCreate a new tenant
listList all tenants
show <id>Show tenant details
delete <id>Delete a tenant

Examples

# Create a tenant
raxe tenant create --name "Acme Corp" --id acme

# Create with strict policy
raxe tenant create --name "Security Team" --id security --policy strict

# List tenants
raxe tenant list
raxe tenant list --json

# Delete tenant
raxe tenant delete acme --force

raxe app

Manage applications within tenants.
raxe app <subcommand>

Subcommands

CommandDescription
createCreate a new app
listList apps for a tenant
show <id>Show app details
delete <id>Delete an app

Examples

# Create an app
raxe app create --tenant acme --name "Chatbot" --id chatbot

# Create with strict policy
raxe app create --tenant acme --name "Trading" --id trading --policy strict

# List apps
raxe app list --tenant acme

# Show details
raxe app show chatbot --tenant acme

raxe policy

Manage security policies for tenants.
raxe policy <subcommand>

Subcommands

CommandDescription
listList available policies
set <policy>Set default policy
explainShow policy resolution
createCreate custom policy

Examples

# List policies (presets + custom)
raxe policy list --tenant acme
raxe policy list --tenant acme --json

# Set tenant default
raxe policy set balanced --tenant acme

# Set app-specific policy
raxe policy set strict --tenant acme --app trading

# Explain resolution chain
raxe policy explain --tenant acme --app trading

Policy Modes

ModeBehavior
monitorNever blocks, logs everything
balancedBlocks CRITICAL, HIGH with confidence ≥ 0.85
strictBlocks CRITICAL, HIGH, and MEDIUM

raxe suppress

Manage suppression rules for false positives.
raxe suppress <subcommand>

Subcommands

CommandDescription
listList all active suppressions
add <pattern>Add a new suppression
remove <pattern>Remove a suppression
auditView suppression audit log

Examples

# List all suppressions
raxe suppress list

# Add a suppression with reason
raxe suppress add pi-001 --reason "Known false positive in auth flow"

# Add with expiration
raxe suppress add "jb-*" --reason "Test suite" --expires 2027-06-01

# Tenant-scoped suppression
raxe suppress add pi-001 --tenant acme --reason "Tenant-specific false positive"
raxe suppress list --tenant acme

# Remove a suppression
raxe suppress remove pi-001

# View audit log
raxe suppress audit

Options for add

OptionDescription
--reasonRequired reason for the suppression
--expiresExpiration date (ISO 8601 format)
--actionOverride action: SUPPRESS, FLAG, LOG
--tenantTenant ID for tenant-scoped suppression

raxe validate-rule

Validate a custom rule file.
raxe validate-rule path/to/rule.yaml

Output

Validating rule.yaml...

 YAML syntax valid
 Schema compliance OK
 Pattern compiles successfully
 No catastrophic backtracking
 Examples pass

Rule is valid!

raxe mssp

Manage MSSPs for partner deployments.
raxe mssp <subcommand>

Subcommands

CommandDescription
createCreate a new MSSP
listList all MSSPs
show <id>Show MSSP details
test-webhook <id>Test webhook connectivity
delete <id>Delete an MSSP
cleanupClean up old audit logs

Create Options

OptionDescription
--idMSSP identifier (must start with mssp_)
--nameHuman-readable MSSP name
--webhook-urlWebhook endpoint URL (HTTPS required)
--webhook-secretShared secret for HMAC signing
--tierSubscription tier: starter, professional, enterprise (default: starter)
--max-customersMaximum customers allowed (default: 10)

Examples

# Create MSSP with webhook
raxe mssp create --id mssp_yourcompany \
    --name "Your Security Services" \
    --webhook-url https://soc.company.com/raxe/alerts \
    --webhook-secret your_secret_here \
    --tier starter \
    --max-customers 10

# List MSSPs
raxe mssp list
raxe mssp list --json

# Show details
raxe mssp show mssp_yourcompany

# Test webhook
raxe mssp test-webhook mssp_yourcompany

# Delete MSSP
raxe mssp delete mssp_yourcompany --force

raxe customer

Manage customers within an MSSP.
raxe customer <subcommand>

Subcommands

CommandDescription
createCreate a new customer
listList customers for an MSSP
show <id>Show customer details
configure <id>Update customer settings
delete <id>Delete a customer

Examples

# Create customer with full data mode
raxe customer create --mssp mssp_yourcompany --id cust_acme \
    --name "Acme Corporation" \
    --data-mode full \
    --retention-days 60

# Create privacy-safe customer
raxe customer create --mssp mssp_yourcompany --id cust_privacy \
    --name "Privacy Corp" \
    --data-mode privacy_safe

# List customers
raxe customer list --mssp mssp_yourcompany
raxe customer list --mssp mssp_yourcompany --json

# Show details
raxe customer show --mssp mssp_yourcompany cust_acme

# Update configuration
raxe customer configure cust_acme --mssp mssp_yourcompany \
    --data-mode privacy_safe \
    --retention-days 90

# Delete customer
raxe customer delete --mssp mssp_yourcompany cust_acme --force

Configuration Options

OptionDescription
--data-modefull or privacy_safe
--retention-daysData retention (0-90 days)
--heartbeat-thresholdSeconds before agent marked offline

SIEM Subcommands

raxe customer siem configure <id> --mssp <mssp_id> --type <type> --url <url> --token <token>
raxe customer siem show <id> --mssp <mssp_id>
raxe customer siem test <id> --mssp <mssp_id>
raxe customer siem disable <id> --mssp <mssp_id>

SIEM Configuration Examples

# Splunk HEC
raxe customer siem configure cust_acme --mssp mssp_yourcompany \
    --type splunk \
    --url https://splunk.company.com:8088/services/collector/event \
    --token "hec-token"

# CEF over HTTP
raxe customer siem configure cust_acme --mssp mssp_yourcompany \
    --type cef \
    --url https://collector.company.com/cef \
    --token "bearer-token"

# CEF over Syslog UDP
raxe customer siem configure cust_acme --mssp mssp_yourcompany \
    --type cef \
    --url syslog://siem.company.com \
    --transport udp --port 514

# CEF over Syslog TCP with TLS
raxe customer siem configure cust_acme --mssp mssp_yourcompany \
    --type cef \
    --url syslog://siem.company.com \
    --transport tcp --port 6514 --tls

# ArcSight SmartConnector
raxe customer siem configure cust_acme --mssp mssp_yourcompany \
    --type arcsight \
    --url https://arcsight.company.com/receiver/v1/events \
    --token "connector-token" \
    --smart-connector-id sc-001

SIEM Types

TypeDescription
splunkSplunk HTTP Event Collector
crowdstrikeCrowdStrike Falcon LogScale
sentinelMicrosoft Sentinel
cefGeneric CEF (HTTP or Syslog)
arcsightArcSight SmartConnector

raxe agent

Manage agents deployed at customer sites.
raxe agent <subcommand>

Subcommands

CommandDescription
registerRegister a new agent
listList agents for an MSSP
status <id>Show agent status
heartbeat <id>Send agent heartbeat
unregister <id>Unregister an agent

Examples

# Register agent
raxe agent register --mssp mssp_yourcompany --customer cust_acme \
    --version 0.10.0 agent_prod_001

# List agents
raxe agent list --mssp mssp_yourcompany
raxe agent list --mssp mssp_yourcompany --json
raxe agent list --mssp mssp_yourcompany --customer cust_acme

# Show agent status
raxe agent status --mssp mssp_yourcompany --customer cust_acme agent_prod_001

# Send heartbeat
raxe agent heartbeat agent_prod_001

# Unregister agent
raxe agent unregister agent_prod_001 --force

Status Output

       Agent Status: agent_prod_001
┌────────────────┬─────────────────────┐
│ Agent ID       │ agent_prod_001      │
│ Status         │ online              │
│ MSSP           │ mssp_yourcompany    │
│ Customer       │ cust_acme           │
│ Version        │ 0.10.0              │
│ Platform       │ darwin              │
│ Last Heartbeat │ 2026-01-30T11:30:00 │
│ Total Scans    │ 1250                │
│ Total Threats  │ 23                  │
└────────────────┴─────────────────────┘