CLI Command Reference#
Lynx FIM is operated through a simple but powerful command-line interface. All commands support the global --config flag to specify a custom configuration path.
Global Flags#
--config string: Path to the configuration file (default is “config.yaml”).-h, --help: Display help information for any command.
1. lynx init#
Initializes the workspace for Lynx FIM.
Usage#
lynx init [flags]What it does:#
Creates a boilerplate config.yaml file in the current directory with sensible defaults. This is always the first step when setting up a new agent.
2. lynx baseline#
Establishes the “Source of Truth” for your monitored files.
Usage#
lynx baseline [flags]Flags#
-o, --output string: Path where the signed baseline JSON will be saved (default “baseline.json”).
What it does:#
- Reads your
config.yamlto find the target paths. - Scans every file and calculates its SHA-256 hash.
- Signs the resulting data with your
LYNX_HMAC_SECRET. - Saves the results to disk. Note: You must run this whenever you intentionally change system files so the agent knows the new state is valid.
3. lynx start#
Activates real-time intrusion detection.
Usage#
lynx start [flags]Flags#
-b, --baseline string: Path to the verified baseline file (default “baseline.json”).
What it does:#
This is the main long-running process.
- Loads the baseline and verifies its HMAC signature.
- Initializes the
inotifywatcher for all configured paths. - Starts the background Alert Dispatcher.
- Logs any file creation, modification, or deletion to the structured JSON log and sends a webhook alert if configured.
4. lynx verify#
Performs a one-off manual integrity audit.
Usage#
lynx verify [flags]Flags#
-b, --baseline string: Path to the verified baseline file (default “baseline.json”).
What it does:#
Use this for manual sweeps. It performs a full scan of the file system and compares it against the baseline immediately, printing a summary of discrepancies to the terminal. Unlike start, this command exits as soon as the audit is complete.
🗺️ Navigation#
- Installation & Setup: How to get the binary.
- Isolated Lab Testing: Safe testing tutorial.
- Back to Introduction