Skip to content

Display Options

Control visual output and reporting.


--tui

Enable Terminal User Interface with real-time progress display.

Features:

  • Real-time progress bars for each scanner
  • Live file counters and asset discovery counts
  • Current directory being scanned
  • Estimated completion percentage
  • Asset breakdown by type (certs, keys, algorithms, libraries, protocols, services, cipher suites)
  • Clean exit summary with PQC assessment
# Enable TUI mode
./build/cbom-generator --tui --output cbom.json

# TUI with specific directory
./build/cbom-generator --tui /etc/ssl

# TUI with multiple paths
./build/cbom-generator --tui --output cbom.json /etc/ssl /etc/pki /usr/share

Display Layout:

+- CBOM Generator ------------------------- CipherIQ v1.0.0 -+
| Progress: [####################] 100%      Time: 00:00:03 |
+- Scanning Progress ------------------------------------------+
| [X] Certificate Scanner  215000 files   152 certs         |
| [X] Key Scanner         216000 files     0 keys           |
| [X] Package Scanner     System-wide      0 pkgs           |
| [X] Service Scanner     System-wide      0 svcs           |
| [X] Filesystem Scanner  164000 files  3689 files          |
| [X] Output Generation   System-wide      1 output         |
+- Status ----------------------------------------------------|
| Total Assets: 289 (193 certs, 16 keys, 14 algos, ...)     |
| COMPLETE                                                   |
+--------------------------------- Graziano Labs Corp. -+
  Press any key to exit

Use when:

  • Interactive scans where you want to monitor progress
  • Large directory scans (prevents "hanging" appearance)
  • Demonstrations or presentations
  • Real-time visibility into scanning status

Note on Error Visibility: In TUI mode, stderr is suppressed to prevent display corruption. Use --error-log to capture errors.


--pqc-report FILE (v1.2+)

Generate comprehensive PQC migration report in human-readable text format.

Features:

  • Executive summary with vulnerability breakdown
  • Assets grouped by break year (2030/2035/2040/2045)
  • Migration timeline with phased approach (2024-2045)
  • NIST standards reference (FIPS 203/204/205)
  • Prioritized recommendations and action items
  • Risk assessment matrix
  • Compliance guidance (NSA CNSA 2.0, FIPS 140-3)
# Generate CBOM + PQC migration report
./build/cbom-generator /etc/ssl/certs \
    --output cbom.json \
    --pqc-report migration-report.txt

# View migration priorities
cat migration-report.txt

# TUI mode with PQC report
./build/cbom-generator --tui \
    --output cbom.json \
    --pqc-report pqc-report.txt

Sample Report Output:

═══════════════════════════════════════════════════════════════
       POST-QUANTUM CRYPTOGRAPHY MIGRATION REPORT
═══════════════════════════════════════════════════════════════

EXECUTIVE SUMMARY
─────────────────
Total Cryptographic Assets: 351
PQC-Safe Assets: 1 (0.3%)
Quantum-Vulnerable Assets: 199 (56.7%)

VULNERABILITY BREAKDOWN BY BREAK YEAR
──────────────────────────────────────
CRITICAL (Break by 2030):    119 assets  [IMMEDIATE ACTION]
HIGH (Break by 2035):         64 assets  [PLAN MIGRATION NOW]
MEDIUM (Break by 2040):        0 assets  [MONITOR CLOSELY]
LOW (Break by 2045+):          0 assets  [LONG-TERM PLAN]

Use Cases:

  • Executive briefings on quantum readiness
  • Migration planning with timelines
  • Compliance reporting (NSA CNSA 2.0 deadline tracking)
  • Risk assessment and prioritization

--error-log FILE

Write errors to a log file with timestamps (especially useful with --tui).

Problem Solved: In TUI mode, stderr output is suppressed to prevent display corruption. Without --error-log, errors are only visible in the final JSON output.

Features:

  • ISO-8601 timestamps: [YYYY-MM-DD HH:MM:SS]
  • Severity levels: [error], [warning]
  • Component name and detailed error message
  • Immediate write with fflush() for real-time visibility
  • Thread-safe operation
# TUI mode with error logging (recommended)
./build/cbom-generator --tui --error-log /tmp/cbom-errors.log --output cbom.json

# Monitor errors in real-time (separate terminal)
tail -f /tmp/cbom-errors.log

# Normal mode with error logging
./build/cbom-generator --error-log /tmp/cbom-errors.log --output cbom.json

Error Log Format:

[2025-11-15 14:33:01] [error] certificate_scanner: Certificate parsing failed: MEMORY_ERROR
[2025-11-15 14:33:02] [warning] key_scanner: Permission denied: /root/.ssh/id_rsa

Real-Time Monitoring:

# Start scan in one terminal
./build/cbom-generator --tui --error-log /tmp/errors.log --output cbom.json

# Monitor errors in another terminal
tail -f /tmp/errors.log