Back

Documentation

Install and run your first scan in 2 minutes

Quick Installation

Requires Ubuntu 22.04+ or Ubuntu 24.04. x86_64 and aarch64 supported.

x86_64

sudo curl -L https://github.com/kolvera-io/kolvera-agent/releases/latest/download/kolvera-agent-x86_64-linux -o /usr/local/bin/kolvera && sudo chmod +x /usr/local/bin/kolvera

aarch64

sudo curl -L https://github.com/kolvera-io/kolvera-agent/releases/latest/download/kolvera-agent-aarch64-linux -o /usr/local/bin/kolvera && sudo chmod +x /usr/local/bin/kolvera

Verify installation:

kolvera --version
✓ kolvera 0.1.2

Initialize & Load CVE Database

Creates config directories, SQLite database, and agent ID.

sudo kolvera init

Downloads CVEs from NVD, marks CISA KEV exploited vulnerabilities, and fetches EPSS scores. This can take 2-3 minutes on first run.

sudo kolvera update
✓ 21695 CVEs processed from NVD · ✓ 56 CVEs marked as actively exploited (KEV) · ✓ 9038 EPSS scores updated

First Scan

Runs a complete scan: package inventory, service detection, CVE correlation, and configuration analysis.

sudo kolvera scan
✓ 809 packages detected · ✓ 2 exposed services: nginx/1.24.0, ssh/9.6p1 · ✓ 21695 CVEs in cache · ✓ 24 vulnerabilities found · ⚠ 6 insecure configurations detected · Summary: 0 Critical 1 High 3 Medium 18 Low

View Results

List all findings with severity, score, and status.

sudo kolvera findings

Filter by severity to focus on critical issues first.

sudo kolvera findings --severity critical

Quick summary of server security posture.

sudo kolvera status

AI Remediation (Pro)

Copy your Pro license key to the server:

sudo cp your-license.key /etc/kolvera/license.key && sudo chmod 600 /etc/kolvera/license.key
sudo kolvera license
Tier: PRO · Customer: YourCompany · Status: Valid

Set your Anthropic API key as environment variable:

export ANTHROPIC_API_KEY="sk-ant-..."

Claude AI analyzes each finding and generates context-aware remediation plans with exact commands, verification steps, and rollback procedures.

sudo -E kolvera remediate
✓ 22 plans generated

Approve a specific remediation plan before execution. Kolvera never executes without human approval.

sudo -E kolvera remediate --approve <PLAN-UUID>

Executes approved plans step-by-step with interactive confirmation. Captures before/after evidence. Automatic rollback if any step fails.

sudo -E kolvera remediate --execute

Reports

Generate a PDF report with findings, severity breakdown, and evidence (Pro).

sudo kolvera report
✓ Report generated: /var/lib/kolvera/reports/kolvera-report-20260331.pdf

Export findings in JSON format for integration with other tools (Community).

sudo kolvera report --format json

Command Reference

CommandFunctionTier
kolvera initInitial setupCommunity
kolvera updateLoad/update CVE databaseCommunity
kolvera scanFull scanCommunity
kolvera scan --quickQuick scan (config only)Community
kolvera statusQuick summaryCommunity
kolvera findingsList findingsCommunity
kolvera findings --severity highFilter by severityCommunity
kolvera remediateGenerate AI plansPro
kolvera remediate --approve <UUID>Approve a planPro
kolvera remediate --executeExecute approved plansPro
kolvera remediate --dry-runPreview without executingPro
kolvera verifyVerify remediationsPro
kolvera reportPDF reportPro
kolvera report --format jsonJSON reportCommunity
kolvera historyScan historyCommunity
kolvera config showView configurationCommunity
kolvera config set <key> <value>Change config valueCommunity
kolvera licenseView license infoCommunity

File Locations

Config/etc/kolvera/config.toml
License/etc/kolvera/license.key
Database/var/lib/kolvera/kolvera.db
CVE Cache/var/lib/kolvera/cve-cache/
Reports/var/lib/kolvera/reports/
Logs/var/log/kolvera/

Source code, issues, and contributions on GitHub

View on GitHub