Documentation Index
Fetch the complete documentation index at: https://mintlify.com/CarlosEduJs/SCAL-P/llms.txt
Use this file to discover all available pages before exploring further.
scalp policy check is a dry-run policy evaluation. It resolves your project’s dependencies from the lockfile, evaluates every package against your allow/deny rules and trust score settings, and reports any violations — without installing, modifying node_modules, or writing to .scalp/lockfile.json. Use it to validate a policy change, preview the impact of a new dependency, or confirm that your current lockfile would pass enforcement before committing.
Synopsis
Flags
Path to the policy file to evaluate. If the file does not exist, SCAL-P logs a warning and evaluates with default permissive settings — nothing is blocked.
Package manager to use for dependency resolution and lockfile parsing. Accepted values:
npm, pnpm.Override enforcement to
block regardless of on_violation in your policy. Use this to ensure a non-zero exit code on any violation in automated pipelines.How it works
Load policy
Reads the policy file from
--policy. If the file is absent, SCAL-P proceeds with default settings and logs a warning.Resolve dependencies
Runs the package manager’s lockfile-only resolution (equivalent to
npm install --package-lock-only). This updates the lockfile without touching node_modules.Parse lockfile
Reads every dependency node from the resolved lockfile — name, version, resolved URL, and integrity hash.
Evaluate policy rules
Checks each package against the allow/deny rules in your policy: trust mode (allowlist, denylist, audit-only), blocked patterns, and required properties.
Evaluate trust scores
If
trust.min_score > 0 or trust.require_hash is set in your policy, scores each package and appends any below-threshold violations to the result.scalp policy check does not write to .scalp/audit.log. It is a read-only inspection of your current policy and lockfile state.Examples
Exit codes
| Code | Meaning |
|---|---|
0 | No violations found, or violations found with warn/log enforcement. |
1 | Violations found and enforcement is block (via policy or --ci flag). |
What it does not do
- Does not install or modify
node_modules. - Does not update
.scalp/lockfile.json. - Does not write audit events.
- Does not publish or transmit any data.