This is a simple command-line tool to read and search through JSON data containing Security Technical Implementation Guide (STIG) information. It allows users to list all the IDs within the provided STIG data and search for findings with a specific STIG version. The program can read data from a local file or fetch data from a remote URL.
This application was designed for the Application STIG. For more information about STIGs, visit the STIG Viewer website.
You can watch a demo of the program in action here:
- Make sure you have Go installed on your system.
- Clone this repository to your local machine.
- Navigate to the project directory and build the binary:
cd stig-viewer
go build -o stgo ./main.go
To list all Vulnerability IDs within the provided STIG data, use the -file
flag for a local file or the -url
flag for a remote URL:
./stgo -file ./stigs/example_app_stig.json
Or:
./stgo -url https://www.example.com/stig.json
To search for findings with a specific STIG version, use the -srg or -vuln flag along with -file or -url:
./stgo -file ./stigs/example_app_stig.json -srg SRG-APP-000074
./stgo -url https://www.example.com/stig.json -vuln V-26680
Or:
./stgo -url https://www.example.com/stig.json -srg SRG-APP-000074
This project is licensed under the MIT License. See the LICENSE file for details.