Crates.io | feluda |
lib.rs | feluda |
version | 1.10.1 |
created_at | 2025-01-14 22:16:29.206878+00 |
updated_at | 2025-09-25 11:16:20.34178+00 |
description | A CLI tool to check dependency licenses. |
homepage | https://github.com/anistark/feluda |
repository | https://github.com/anistark/feluda |
max_upload_size | |
id | 1516789 |
size | 666,270 |
🔎 Feluda is a Rust-based command-line tool that analyzes the dependencies of a project, notes down their licenses, and flags any permissions that restrict personal or commercial usage or are incompatible with your project's license.
👋 It's still highly experimental, but fast iterating. Welcoming contributors and support to help bring out this project even better!
Feluda supports analyzing dependencies across multiple languages simultaneously.
feluda
You can also filter the analysis to a specific language using the --language
flag.
If you already had it, make sure it's up-to-date and update if needed. (Optional) Set rust path if not set already.
cargo install feluda
feluda is available in the Homebrew. You can install it using brew:
brew install feluda
feluda is available in the AUR. You can install it using an AUR helper (e.g. paru):
paru -S feluda
On NetBSD a package is available from the official repositories. To install it, simply run:
pkgin install feluda
Feluda is available as a DEB package for Debian-based systems.
.deb
file from GitHub Releases# Install the downloaded DEB package
sudo dpkg -i feluda_*.deb
# If there are dependency issues, fix them
sudo apt install -f
Feluda is available as an RPM package for Red Hat-based systems.
.rpm
file from GitHub Releases# Install the downloaded RPM package
sudo rpm -ivh feluda_*.rpm
# Or using dnf (Fedora/newer RHEL)
sudo dnf install feluda_*.rpm
# Or using yum (older RHEL/CentOS)
sudo yum install feluda_*.rpm
Track releases on github releases or via release feed.
Note: This might have experimental features which might not work as intended.
First, clone the repository:
git clone https://github.com/anistark/feluda.git
cd feluda
Then, build the project using Cargo:
cargo build --release
Finally, to make feluda
available globally, move the binary to a directory in your PATH. For example:
sudo mv target/release/feluda /usr/local/bin/
Feluda provides license analysis by default, with an additional command for generating compliance files. Analyze your project's dependencies and their licenses:
# Basic usage
feluda
# Specify a path to your project directory
feluda --path /path/to/project/
# Check with specific language
feluda --language {rust|node|go|python|c|cpp}
# Filter by OSI approval status
feluda --osi approved # Show only OSI approved licenses
feluda --osi not-approved # Show only non-OSI approved licenses
feluda --osi unknown # Show licenses with unknown OSI status
Generate compliance files for legal requirements:
# Interactive file generation
feluda generate
# Generate for specific language and license
feluda generate --language rust --project-license MIT
# Generate for specific path
feluda generate --path /path/to/project/
Generate Software Bill of Materials (SBOM) for your project:
# Generate SPDX format SBOM to console
feluda --sbom spdx
# Generate SPDX SBOM to file
feluda --sbom spdx --output-file project-name-sbom.json
# Generate all supported formats (currently only SPDX is implemented)
feluda --sbom all --output-file project-name-sbom
Supported SBOM Formats:
What's Included in SBOM:
Use Cases:
feluda --repo <repository_url> [--ssh-key <key_path>] [--ssh-passphrase <passphrase>] [--token <https_token>]
<repository_url>: The URL of the Git repository to clone (e.g., git@github.com:user/repo.git or https://github.com/user/repo.git).
--ssh-key <key_path>: (Optional) Path to a private SSH key for authentication.
--ssh-passphrase <passphrase>: (Optional) Passphrase for the SSH key.
--token <https_token>: (Optional) HTTPS token for authenticating with private repositories.
If you're using Feluda, feel free to grab a Scanned with Feluda badge for your project:
[](https://github.com/anistark/feluda)
Replace the repo name and username. Once you've the Feluda GitHub Action setup, this badge will be automatically updated.
Feluda can generate essential compliance files required for commercial software distribution and open source projects.
A NOTICE file is a concise summary document that provides attribution for third-party components:
A THIRD_PARTY_LICENSES file provides comprehensive license documentation:
Legal Protection: Many open source licenses require attribution when redistributing code. These files ensure compliance and protect your organization from legal issues.
Transparency: Shows exactly what third-party code is included in your application, building trust with users and stakeholders.
Commercial Readiness: Essential for commercial software, enterprise deployments, and app store submissions.
Audit Preparation: Makes license audits faster and easier by providing all necessary documentation in standard formats.
⚠️ DISCLAIMER: Feluda is still in early stages. While we're trying to follow through all compliances, users are responsible for:
Feluda and its contributors disclaim all warranties and are not liable for any legal issues arising from the use of this information. Use at your own risk.
--json
flag for JSON output.feluda --json
Sample Output for a sample cargo.toml file containing serde
and tokio
dependencies:
[
{
"name": "serde",
"version": "1.0.151",
"license": "MIT",
"is_restrictive": false,
"compatibility": "Compatible",
"osi_status": "Approved"
},
{
"name": "tokio",
"version": "1.0.2",
"license": "MIT",
"is_restrictive": false,
"compatibility": "Compatible",
"osi_status": "Approved"
}
]
Use the --yaml
flag for YAML output
feluda --yaml
Sample Output for a sample cargo.toml file containing serde
and tokio
dependencies:
- name: serde
version: 1.0.151
license: MIT
is_restrictive: false
compatibility: Compatible
osi_status: Approved
- name: tokio
version: 1.0.2
license: MIT
is_restrictive: false
compatibility: Compatible
osi_status: Approved
For a short summary, in case you don't want all that output covering your screen:
feluda --gist
For detailed information about each dependency:
feluda --verbose
The verbose mode displays a table with an additional "OSI Status" column showing whether each license is approved by the Open Source Initiative (OSI).
Feluda integrates with the Open Source Initiative (OSI) to provide license approval status information. This feature helps you identify whether the licenses used by your dependencies are officially approved by the OSI.
approved
: License is officially approved by the OSIunknown
: License status with OSI is unknown or the license is not OSI approvedFilter dependencies by their OSI approval status:
# Show only OSI approved licenses
feluda --osi approved --verbose
# Show only non-approved or unknown OSI status licenses
feluda --osi not-approved --verbose
# Show licenses with unknown OSI status
feluda --osi unknown --verbose
# Combine with JSON output
feluda --osi approved --json
Note: OSI status information is only displayed in --verbose
mode, --gui
mode, or when using structured output formats (JSON/YAML) to keep the default output clean.
Feluda can check if dependency licenses are compatible with your project's license:
feluda --project-license MIT
You can also filter for incompatible licenses only:
feluda --incompatible
And fail CI builds if incompatible licenses are found:
feluda --fail-on-incompatible
In case you strictly need only the restrictive dependencies:
feluda --strict
We've an awesome ✨ TUI mode available to browse through the dependencies in a visually appealing way as well:
feluda --gui
Feluda provides several options for CI integration:
--ci-format <github|jenkins>
: Generate output compatible with the specified CI system--fail-on-restrictive
: Make the CI build fail when restrictive licenses are found--fail-on-incompatible
: Make the CI build fail when incompatible licenses are found--osi <approved|not-approved|unknown>
: Filter by OSI license approval status--output-file <path>
: Write the output to a file instead of stdoutFeluda can be easily integrated into your CI/CD pipelines with built-in support for GitHub Actions and Jenkins.
To use Feluda with GitHub Actions, simply use the published action. For detailed documentation, see the GitHub Action README.
name: License Check
on:
push:
branches: [ main ]
pull_request:
branches: [ main ]
jobs:
license-check:
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Scan licenses
uses: anistark/feluda@v1
with:
fail-on-restrictive: true
fail-on-incompatible: true
Advanced usage with compliance files:
- name: Scan licenses
uses: anistark/feluda@v1
with:
fail-on-restrictive: true
project-license: 'MIT'
update-badge: true
- name: Generate compliance files
run: |
echo "1" | feluda generate # Auto-select NOTICE file
echo "2" | feluda generate # Auto-select THIRD_PARTY_LICENSES file
- name: Generate SBOM
run: feluda --sbom spdx --output-file sbom.spdx.json
- name: Upload compliance artifacts
uses: actions/upload-artifact@v4
with:
name: license-compliance
path: |
NOTICE
THIRD_PARTY_LICENSES.md
sbom.spdx.json
Checkout contributing guidelines if you are looking to contribute to this project.
Currently, using choosealicense license directory for source of truth.
Feluda allows you to customize which licenses are considered restrictive through configuration. This can be done in three ways, listed in order of precedence (highest to lowest):
.feluda.toml
configuration fileBy default, Feluda considers the following licenses as restrictive:
Create a .feluda.toml
file in your project root to override the default restrictive licenses:
[licenses]
# Override the default list of restrictive licenses
restrictive = [
"GPL-3.0", # GNU General Public License v3.0
"AGPL-3.0", # GNU Affero General Public License v3.0
"Custom-1.0", # Your custom license identifier
]
You can also override the configuration using environment variables:
# Override restrictive licenses list
export FELUDA_LICENSES_RESTRICTIVE='["GPL-3.0","AGPL-3.0","Custom-1.0"]'
The environment variables take precedence over both the configuration file and default values.
Feluda uses a comprehensive license compatibility matrix to determine whether dependency licenses are compatible with your project's license. This matrix is maintained in an external TOML configuration file for easy updates and maintenance.
When you use the --project-license
flag or Feluda auto-detects your project license, it checks each dependency's license against a compatibility matrix to determine:
The license compatibility rules are stored in:
config/license_compatibility.toml
This file defines which dependency licenses are compatible with each project license type. For example:
[MIT]
compatible_with = [
"MIT",
"BSD-2-Clause",
"BSD-3-Clause",
"Apache-2.0",
"ISC",
# ... more permissive licenses
]
[GPL-3.0]
compatible_with = [
"MIT",
"BSD-2-Clause",
"Apache-2.0",
"LGPL-2.1",
"LGPL-3.0",
"GPL-2.0",
"GPL-3.0",
# ... GPL-compatible licenses
]
The matrix currently supports compatibility checking for:
Advanced users can customize compatibility rules by:
.feluda/license_compatibility.toml
in your home directoryconfig/license_compatibility.toml
takes precedenceImportant: Modifying compatibility rules requires legal expertise. Consult legal counsel before making changes that could affect your project's compliance.
⚠️ Legal Disclaimer: The license compatibility matrix is provided as a helpful tool, but:
Happy coding with Feluda! 🚀