The official CLI for Postvale - TLS, DMARC, DNS, threat-intel, and compliance evidence for any public domain. Free, no signup for the read-only checks; sign in for monitoring + workpapers.
$ postvale check example.com
┌─ example.com ─────────────────────────── A- ─┐
│ │
│ TLS A Cert valid · TLS 1.3 · HSTS│
│ DMARC A p=reject · alignment strict│
│ SPF B Soft fail (~all) │
│ DKIM A 1 selector active │
│ MTA-STS A Enforced │
│ DNSSEC A Validated │
│ CAA B Only issue, no issuewild │
│ Headers C Missing CSP, COOP, COEP │
│ │
└──────────────────────────────────────────────┘
→ Full report: https://postvale.app/check/example.com
brew install postvaleapp/tap/postvalescoop bucket add postvale https://github.com/postvaleapp/scoop-bucket
scoop install postvalecurl -fsSL https://postvale.app/install.sh | shgo install github.com/postvaleapp/postvale-cli/cmd/postvale@latestPre-built binaries for linux, darwin, windows × amd64 / arm64
are on the releases page.
No signup needed for read-only checks:
postvale check example.com # full posture
postvale tls api.example.com # TLS / SSL only
postvale dmarc example.com # DMARC + SPF
postvale dns example.com # DNS health
postvale scam < suspicious-email.eml # Scam Check from stdin
postvale spf flatten example.com # SPF include flattenerSign in to add domains to continuous monitoring or pull audit workpapers:
postvale auth login # opens browser
postvale watch example.com # add to Pro+ monitoring
postvale alerts --since 24h # recent alerts on your monitored set
postvale workpaper email-auth example.com > wp-email-auth.pdfThe CLI is designed to drop into CI/CD pipelines:
# .github/workflows/posture.yml
- name: Check TLS posture
run: |
curl -fsSL https://postvale.app/install.sh | sh
postvale tls --quiet --exit-on-fail $DOMAIN--exit-on-fail exits non-zero if the check returns a grade below B
or a failing verdict. Combine with --json for machine-readable
output you can store as a build artifact.
- Default: pretty terminal output with colour + box drawing
--json: structured JSON (every command supports it)--quiet: minimal output (one-line summary or nothing on success)--no-color: disable ANSI (auto-disabled on non-TTY)
Run postvale help for the full command list, or postvale help <command>
for per-command flags. See docs/commands.md for the
full reference.
postvale tuiOpens an interactive Bubbletea
dashboard for your monitored domains, recent alerts, and one-shot
checks. Press ? for keyboard shortcuts. Pro+ feature - free tier
opens in read-only "demo data" mode.
The CLI doesn't ship telemetry. The only network calls it makes are
to postvale.app. No phone-home, no anonymous analytics, no crash
reporting unless you opt in via postvale auth login --share-crashes.
Tokens are stored in your OS keychain (macOS Keychain, Windows
Credential Manager, libsecret on Linux). On systems without a
keychain we fall back to ~/.config/postvale/token with 0600
permissions.
Bug reports + PRs welcome. See CONTRIBUTING.md.
MIT - see LICENSE.