Getting Started with Panguard
Install Panguard, run your first scan, and enable real-time protection in under 5 minutes.
System Requirements
- Linux (Ubuntu 20.04+, Debian 11+, CentOS 8+) or macOS 12+
- Node.js 18+ (auto-installed if missing)
- 2 GB RAM minimum, 4 GB recommended
Step 1: Install Panguard
One command installs everything: the CLI, rule engine, and local AI model.
curl -fsSL https://get.panguard.ai | sh
The installer auto-detects your OS and architecture. Expected output:
[OK] Panguard v1.0.0 installed
[OK] Rule engine loaded (3,155 Sigma + 423 YARA rules)
[OK] Local LLM ready (Ollama)
[OK] Monitoring started. Learning period: 7 days.
Step 2: Run Your First Scan
A quick scan checks your system for common vulnerabilities in about 60 seconds.
panguard scan
For a comprehensive analysis including all ports, SSL certificates, and configuration files:
panguard scan --deep
Step 3: Enable Real-Time Protection
Guard runs as a daemon, monitoring your system 24/7 with Sigma and YARA rules.
panguard guard start
[OK] Guard daemon started
[OK] Watching 12 network interfaces
[OK] Sigma rules: 3,155 loaded
[OK] YARA rules: 423 loaded
[OK] Baseline learning: active (7 days)
Step 4: Set Up Notifications
Panguard Chat sends you plain-language notifications when threats are detected and resolved.
panguard chat config # Follow the prompts to connect Slack, LINE, or Telegram
Step 5: Understanding Scan Results
Every scan produces a security score, grade, and detailed findings. Here's how to read them.
Score: Security Score (0-100): 0 = critical risk, 100 = fully protected. Anything below 60 needs immediate attention.
Grade: Grade: A (90+), B (75-89), C (60-74), D (40-59), F (below 40). Target grade B or higher.
Findings: Findings are sorted by severity: Critical > High > Medium > Low. Fix critical issues first.
Step 6: JSON Output for AI Agents
Panguard is Agent-Native. Use --json to get machine-readable output that AI agents can parse directly.
panguard scan --json
When --json is active, no spinners, banners, or colors are output. Pure JSON only.
Example JSON output:
{
"version": "0.5.0",
"target": "localhost",
"risk_score": 35,
"grade": "C",
"findings_count": 8,
"findings": [ ... ],
"agent_friendly": true
}Your AI agent can call Panguard via subprocess and parse the JSON response to make security decisions autonomously.
Step 7: Remote Scanning
Scan any server or domain from outside. Panguard checks open ports, SSL certificates, HTTP headers, and DNS records.
panguard scan --target example.com panguard scan --target 1.2.3.4 --json
Remote scans use Node.js built-in modules only. No nmap required. Combine with --json for automated monitoring.
Step 8: Compliance Reports
Generate ISO 27001, SOC 2, or Taiwan Cyber Security Act compliance reports automatically. Requires Pro plan.
panguard report generate --framework iso27001 panguard report generate --framework soc2 panguard report generate --framework tcsa
Supported frameworks: ISO 27001 Annex A, SOC 2 Trust Services Criteria, Taiwan TCSA (ISMS).
Reports can be generated in English or Traditional Chinese. PDF export coming soon.
More CLI Commands
Panguard has a full CLI toolkit. Here are the most useful commands beyond scan and guard.
Check your account and subscription status:
panguard whoami
Set up notification channels (LINE, Telegram, Slack, email):
panguard chat config
Deploy honeypot services to profile attackers (Pro plan):
panguard trap deploy --services ssh,http
List supported compliance frameworks:
panguard report list
Check Guard engine status:
panguard guard status
What's Next?
Explore the full documentation to customize rules, integrate with CI/CD, or set up compliance reports.