data
OSV CLI for AI Agents
Use the OSV CLI from KosmoKrator to call OSV tools headlessly, return JSON, inspect schemas, and automate workflows from coding agents, scripts, and CI.OSV CLI Setup
OSV can be configured headlessly with `kosmokrator integrations:configure osv`.
# Install KosmoKrator first if it is not available on PATH.
curl -fsSL https://raw.githubusercontent.com/OpenCompanyApp/kosmokrator/main/install.sh | bash
# Configure and verify this integration.
kosmokrator integrations:configure osv --enable --read allow --write ask --json
kosmokrator integrations:doctor osv --json
kosmokrator integrations:status --json Credentials
Authentication type: No credentials none. Configure credentials once, then reuse the same stored profile from scripts, coding CLIs, Lua, and MCP.
No credentials are required.
Command Patterns
The generic command is stable across every integration. The provider shortcut is shorter for humans.
kosmo integrations:call osv.osv_query '{}' --json kosmo integrations:osv osv_query '{}' --json Discovery
These commands return structured output for coding agents that need to inspect capabilities before choosing a function.
kosmo integrations:docs osv --json
kosmo integrations:docs osv.osv_query --json
kosmo integrations:schema osv.osv_query --json
kosmo integrations:search "OSV" --json
kosmo integrations:list --json Automation Contexts
The same configured command surface works in these environments. The command does not change unless the host wrapper, credentials, or permissions change.
CLI Functions
Every function below can be called headlessly. Commands are highlighted, copyable, and scroll horizontally when payloads are long.
osv.osv_query
Query vulnerabilities for one package version, purl, or commit.
read - Parameters
- none
kosmo integrations:call osv.osv_query '{}' --json kosmo integrations:osv osv_query '{}' --json osv.osv_query_batch
Query vulnerabilities for multiple package versions or commits.
read - Parameters
- none
kosmo integrations:call osv.osv_query_batch '{}' --json kosmo integrations:osv osv_query_batch '{}' --json osv.osv_get_vulnerability
Retrieve one OSV vulnerability record by ID.
read - Parameters
- none
kosmo integrations:call osv.osv_get_vulnerability '{}' --json kosmo integrations:osv osv_get_vulnerability '{}' --json osv.osv_import_findings
Retrieve experimental import-quality findings for a source.
read - Parameters
- none
kosmo integrations:call osv.osv_import_findings '{}' --json kosmo integrations:osv osv_import_findings '{}' --json osv.osv_determine_version
Experimentally identify likely C/C++ library versions from file hashes.
read - Parameters
- none
kosmo integrations:call osv.osv_determine_version '{}' --json kosmo integrations:osv osv_determine_version '{}' --json Function Schemas
Use these parameter tables when building CLI payloads without calling integrations:schema first.
osv.osv_query 0 parameters
kosmo integrations:schema osv.osv_query --json | Parameter | Type | Required | Description |
|---|---|---|---|
| No parameters. | |||
osv.osv_query_batch 0 parameters
kosmo integrations:schema osv.osv_query_batch --json | Parameter | Type | Required | Description |
|---|---|---|---|
| No parameters. | |||
osv.osv_get_vulnerability 0 parameters
kosmo integrations:schema osv.osv_get_vulnerability --json | Parameter | Type | Required | Description |
|---|---|---|---|
| No parameters. | |||
osv.osv_import_findings 0 parameters
kosmo integrations:schema osv.osv_import_findings --json | Parameter | Type | Required | Description |
|---|---|---|---|
| No parameters. | |||
osv.osv_determine_version 0 parameters
kosmo integrations:schema osv.osv_determine_version --json | Parameter | Type | Required | Description |
|---|---|---|---|
| No parameters. | |||
Permissions
Headless calls still follow the integration read/write permission policy. Configure read/write defaults with
integrations:configure. Add --force only for trusted automation that should bypass that policy.