Skip to content

vypher

Vypher is a PII and PHI scanning tool

Synopsis

Vypher is a CLI tool designed to scan directories for Personally Identifiable Information (PII) and Protected Health Information (PHI) with a focus on finance and healthcare data.

It helps developers and security professionals identify sensitive data leaks in their codebase or file systems.

Use --config to load settings from a YAML configuration file. CLI flags always take precedence over config file values.

Options

  -c, --config string   config file (e.g. .vypher.yaml)
  -h, --help            help for vypher

Configuration File

Vypher can load default settings from a YAML configuration file, which is useful for teams or projects with consistent scan requirements. Pass the path with --config:

bash
vypher scan --config .vypher.yaml

All supported fields:

yaml
# Glob patterns to exclude from scanning.
# Supports standard glob syntax: *, **, ?, [abc]
exclude:
  - "*_test.go"
  - "*.log"
  - "testdata/**"

# Rule tags to enable. When set, only patterns matching these tags are run.
# Available tags: finance, pii, healthcare, phi, crypto, communication, government
# Omit this field (or leave empty) to run all rules.
rules:
  - finance
  - phi

# Output format: console (default), json, or sarif
output: sarif

# Maximum directory recursion depth. 0 means unlimited.
max_depth: 5

# Exit with code 1 if any findings are detected. Useful for CI/CD pipelines.
fail_on_match: true

Field reference:

FieldTypeDefaultDescription
excludelist of strings[]Glob patterns for files/dirs to skip
ruleslist of stringsall rulesRule tags to enable
outputstringconsoleOutput format (console, json, sarif)
max_depthinteger0 (unlimited)Maximum scan depth
fail_on_matchbooleanfalseExit code 1 on any finding

CLI flags always override config file values. For example, --output json will override output: sarif in the config file.

SEE ALSO

Released under the MIT License.