🔎 Feluda is a Rust-based command-line tool that analyzes the dependencies of a project, notes down their licenses, and flags any permissions that restrict personal or commercial usage or are incompatible with your project's license.
👋 It's still highly experimental, but fast iterating. Welcoming contributors and support to help bring out this project even better!
- Parse your project to identify dependencies and their licenses.
- Classify licenses into permissive, restrictive, or unknown categories.
- Check license compatibility between dependencies and your project's license.
- Map licenses to OSI (Open Source Initiative) approval status and filter by OSI approval.
- Flag dependencies with licenses that may restrict personal or commercial use.
- Flag dependencies with licenses that may be incompatible with your project's license.
- Generate compliance files (NOTICE and THIRD_PARTY_LICENSES) for legal requirements.
- Generate Software Bill of Materials (SBOM) in SPDX format for security and compliance.
- Output results in plain text, JSON or TUI formats. There's also a gist format which is available in restrictive mode to output a single line only.
- CI/CD support for Github Actions and Jenkins.
- Verbose mode gives an enhanced view of all licenses.
Feluda supports analyzing dependencies across multiple languages simultaneously.
feludaYou can also filter the analysis to a specific language using the --language flag.
Rust (Crate)
- Rust installed on your system.
If you already had it, make sure it's up-to-date and update if needed. (Optional) Set rust path if not set already.
cargo install feludaHomebrew (maintained by @chenrui333)
feluda is available in the Homebrew. You can install it using brew:
brew install feludaArch Linux (maintained by @adamperkowski)
feluda is available in the AUR. You can install it using an AUR helper (e.g. paru):
paru -S feludaNetBSD (maintained by @0323pin)
On NetBSD a package is available from the official repositories. To install it, simply run:
pkgin install feludaDEB Package (Debian/Ubuntu/Pop! OS)
Feluda is available as a DEB package for Debian-based systems.
- Download the latest
.debfile from GitHub Releases - Install the package:
# Install the downloaded DEB package
sudo dpkg -i feluda_*.deb
# If there are dependency issues, fix them
sudo apt install -fRPM Package (RHEL/Fedora/CentOS)
Feluda is available as an RPM package for Red Hat-based systems.
- Download the latest
.rpmfile from GitHub Releases - Install the package:
# Install the downloaded RPM package
sudo rpm -ivh feluda_*.rpm
# Or using dnf (Fedora/newer RHEL)
sudo dnf install feluda_*.rpm
# Or using yum (older RHEL/CentOS)
sudo yum install feluda_*.rpmTrack releases on github releases or via release feed.
Build from Source (advanced users)
Note: This might have experimental features which might not work as intended.
First, clone the repository:
git clone https://github.com/anistark/feluda.git
cd feludaThen, build the project using Cargo:
cargo build --releaseFinally, to make feluda available globally, move the binary to a directory in your PATH. For example:
sudo mv target/release/feluda /usr/local/bin/Feluda provides license analysis by default, with an additional command for generating compliance files. Analyze your project's dependencies and their licenses:
# Basic usage
feluda
# Specify a path to your project directory
feluda --path /path/to/project/
# Check with specific language
feluda --language {rust|node|go|python|c|cpp|r}
# Filter by OSI approval status
feluda --osi approved # Show only OSI approved licenses
feluda --osi not-approved # Show only non-OSI approved licenses
feluda --osi unknown # Show licenses with unknown OSI statusGenerate compliance files for legal requirements:
# Interactive file generation
feluda generate
# Generate for specific language and license
feluda generate --language rust --project-license MIT
# Generate for specific path
feluda generate --path /path/to/project/Generate Software Bill of Materials (SBOM) for your project:
# Generate all supported SBOM formats (SPDX + CycloneDX)
feluda sbom
# Generate SPDX format SBOM only
feluda sbom spdx
# Generate SPDX format SBOM to file
feluda sbom spdx --output sbom.json
# Generate CycloneDX format SBOM only
feluda sbom cyclonedx
# Generate CycloneDX format SBOM to file
feluda sbom cyclonedx --output sbom.json
# Generate all formats with custom output
feluda sbom --output sbom-outputSupported SBOM Formats:
- SPDX 2.3 - Software Package Data Exchange format (JSON)
- CycloneDX - CycloneDX v1.5 format (JSON)
What's Included in SBOM:
- Package names and versions
- License information
- SPDX identifiers
- License compatibility flags
- Tool metadata and generation timestamp
Use Cases:
- 🔒 Security compliance - Track all dependencies for vulnerability management
- 📋 Supply chain transparency - Document your software's components
- 🏢 Enterprise requirements - Meet organizational SBOM mandates
- 🔍 Audit preparation - Provide comprehensive dependency documentation
feluda --repo <repository_url> [--ssh-key <key_path>] [--ssh-passphrase <passphrase>] [--token <https_token>]<repository_url>: The URL of the Git repository to clone (e.g., [email protected]:user/repo.git or https://github.com/user/repo.git).
--ssh-key <key_path>: (Optional) Path to a private SSH key for authentication.
--ssh-passphrase <passphrase>: (Optional) Passphrase for the SSH key.
--token <https_token>: (Optional) HTTPS token for authenticating with private repositories.
If you're using Feluda, feel free to grab a Scanned with Feluda badge for your project:
[](https://github.com/anistark/feluda)Replace the repo name and username. Once you've the Feluda GitHub Action setup, this badge will be automatically updated.
Feluda can generate essential compliance files required for commercial software distribution and open source projects.
A NOTICE file is a concise summary document that provides attribution for third-party components:
- Purpose: Quick overview of all third-party components and their licenses
- Content: Organized by license type, lists all dependencies with their versions
- Use Cases:
- Legal compliance documentation
- Quick reference for license audits
- Attribution requirements for many open source licenses
A THIRD_PARTY_LICENSES file provides comprehensive license documentation:
- Purpose: Complete legal documentation for all dependencies
- Content: Full license texts, compatibility analysis, package URLs, and copyright information
- Use Cases:
- Commercial software distribution requirements
- Legal compliance for enterprise applications
- Due diligence for acquisitions and audits
- App store submissions (iOS, Android, etc.)
Legal Protection: Many open source licenses require attribution when redistributing code. These files ensure compliance and protect your organization from legal issues.
Transparency: Shows exactly what third-party code is included in your application, building trust with users and stakeholders.
Commercial Readiness: Essential for commercial software, enterprise deployments, and app store submissions.
Audit Preparation: Makes license audits faster and easier by providing all necessary documentation in standard formats.
- Verifying accuracy of all license information
- Ensuring compliance with all applicable license terms
- Consulting legal counsel for license compliance matters
- Checking official repositories for up-to-date license information
Feluda and its contributors disclaim all warranties and are not liable for any legal issues arising from the use of this information. Use at your own risk.
- 📱 Mobile app distribution (iOS App Store, Google Play)
- 🏢 Enterprise software deployment
- 💼 Commercial product releases
- 🔍 Legal compliance audits
- 🤝 Open source project attribution
- 📄 Regulatory compliance (GDPR, SOX, etc.)
- Default: Plain text.
- JSON: Use the
--jsonflag for JSON output.
feluda --jsonSample Output for a sample cargo.toml file containing serde and tokio dependencies:
[
{
"name": "serde",
"version": "1.0.151",
"license": "MIT",
"is_restrictive": false,
"compatibility": "Compatible",
"osi_status": "Approved"
},
{
"name": "tokio",
"version": "1.0.2",
"license": "MIT",
"is_restrictive": false,
"compatibility": "Compatible",
"osi_status": "Approved"
}
]Use the --yaml flag for YAML output
feluda --yamlSample Output for a sample cargo.toml file containing serde and tokio dependencies:
- name: serde
version: 1.0.151
license: MIT
is_restrictive: false
compatibility: Compatible
osi_status: Approved
- name: tokio
version: 1.0.2
license: MIT
is_restrictive: false
compatibility: Compatible
osi_status: ApprovedFor a short summary, in case you don't want all that output covering your screen:
feluda --gistFor detailed information about each dependency:
feluda --verboseThe verbose mode displays a table with an additional "OSI Status" column showing whether each license is approved by the Open Source Initiative (OSI).
Feluda integrates with the Open Source Initiative (OSI) to provide license approval status information. This feature helps you identify whether the licenses used by your dependencies are officially approved by the OSI.
approved: License is officially approved by the OSIunknown: License status with OSI is unknown or the license is not OSI approved
Filter dependencies by their OSI approval status:
# Show only OSI approved licenses
feluda --osi approved --verbose
# Show only non-approved or unknown OSI status licenses
feluda --osi not-approved --verbose
# Show licenses with unknown OSI status
feluda --osi unknown --verbose
# Combine with JSON output
feluda --osi approved --jsonNote: OSI status information is only displayed in --verbose mode, --gui mode, or when using structured output formats (JSON/YAML) to keep the default output clean.
Feluda can check if dependency licenses are compatible with your project's license:
feluda --project-license MITYou can also filter for incompatible licenses only:
feluda --incompatibleAnd fail CI builds if incompatible licenses are found:
feluda --fail-on-incompatibleIn case you need to see only the restrictive dependencies:
feluda --restrictiveWe've an awesome ✨ TUI mode available to browse through the dependencies in a visually appealing way as well:
feluda --guiFeluda provides several options for CI integration:
--ci-format <github|jenkins>: Generate output compatible with the specified CI system--fail-on-restrictive: Make the CI build fail when restrictive licenses are found--fail-on-incompatible: Make the CI build fail when incompatible licenses are found--osi <approved|not-approved|unknown>: Filter by OSI license approval status--output-file <path>: Write the output to a file instead of stdout
Feluda can be easily integrated into your CI/CD pipelines with built-in support for GitHub Actions and Jenkins.
To use Feluda with GitHub Actions, simply use the published action. For detailed documentation, see the GitHub Action README.
name: License Check
on:
push:
branches: [ main ]
pull_request:
branches: [ main ]
jobs:
license-check:
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Scan licenses
uses: anistark/feluda@v1
with:
fail-on-restrictive: true
fail-on-incompatible: trueAdvanced usage with compliance files:
- name: Scan licenses
uses: anistark/feluda@v1
with:
fail-on-restrictive: true
project-license: 'MIT'
update-badge: true
- name: Generate compliance files
run: |
echo "1" | feluda generate # Auto-select NOTICE file
echo "2" | feluda generate # Auto-select THIRD_PARTY_LICENSES file
- name: Generate SBOM
run: feluda --sbom spdx --output-file sbom.spdx.json
- name: Upload compliance artifacts
uses: actions/upload-artifact@v4
with:
name: license-compliance
path: |
NOTICE
THIRD_PARTY_LICENSES.md
sbom.spdx.jsonCheckout contributing guidelines if you are looking to contribute to this project.
Currently, using choosealicense license directory for source of truth.
Feluda allows you to customize which licenses are considered restrictive through configuration. This can be done in three ways, listed in order of precedence (highest to lowest):
- Environment variables
.feluda.tomlconfiguration file- Default values
By default, Feluda considers the following licenses as restrictive:
- GPL-3.0
- AGPL-3.0
- LGPL-3.0
- MPL-2.0
- SEE LICENSE IN LICENSE
- CC-BY-SA-4.0
- EPL-2.0
Create a .feluda.toml file in your project root to override the default restrictive licenses:
[licenses]
# Override the default list of restrictive licenses
restrictive = [
"GPL-3.0", # GNU General Public License v3.0
"AGPL-3.0", # GNU Affero General Public License v3.0
"Custom-1.0", # Your custom license identifier
]You can also override the configuration using environment variables:
# Override restrictive licenses list
export FELUDA_LICENSES_RESTRICTIVE='["GPL-3.0","AGPL-3.0","Custom-1.0"]'The environment variables take precedence over both the configuration file and default values.
Feluda uses a comprehensive license compatibility matrix to determine whether dependency licenses are compatible with your project's license. This matrix is maintained in an external TOML configuration file for easy updates and maintenance.
When you use the --project-license flag or Feluda auto-detects your project license, it checks each dependency's license against a compatibility matrix to determine:
- ✅ Compatible: Safe to use with your project license
- ❌ Incompatible: May create legal issues or licensing conflicts
- ❓ Unknown: License compatibility cannot be determined
The license compatibility rules are stored in:
config/license_compatibility.tomlThis file defines which dependency licenses are compatible with each project license type. For example:
[MIT]
compatible_with = [
"MIT",
"BSD-2-Clause",
"BSD-3-Clause",
"Apache-2.0",
"ISC",
# ... more permissive licenses
]
[GPL-3.0]
compatible_with = [
"MIT",
"BSD-2-Clause",
"Apache-2.0",
"LGPL-2.1",
"LGPL-3.0",
"GPL-2.0",
"GPL-3.0",
# ... GPL-compatible licenses
]The matrix currently supports compatibility checking for:
- MIT - Most permissive, allows only permissive dependency licenses
- Apache-2.0 - Permissive license compatible with most open source licenses
- GPL-3.0 - Copyleft license with broad compatibility including LGPL and other GPL versions
- GPL-2.0 - Stricter copyleft (cannot include Apache-2.0 dependencies)
- AGPL-3.0 - Network copyleft with GPL-3.0 compatibility plus AGPL
- LGPL-3.0 / LGPL-2.1 - Lesser GPL variants with limited compatibility
- MPL-2.0 - Mozilla Public License with moderate compatibility
- BSD-3-Clause / BSD-2-Clause - BSD variants with permissive-only compatibility
- ISC, 0BSD, Unlicense, WTFPL - Various permissive licenses
Advanced users can customize compatibility rules by:
- User-specific overrides: Create
.feluda/license_compatibility.tomlin your home directory - Project-specific rules: The local
config/license_compatibility.tomltakes precedence
Important: Modifying compatibility rules requires legal expertise. Consult legal counsel before making changes that could affect your project's compliance.
- Not legal advice: Always consult qualified legal counsel for license compliance
- Your responsibility: Users must verify all license compatibility decisions
- No warranty: Feluda and its contributors provide no warranties regarding license compatibility
- Complexity: License compatibility can depend on specific use cases, distribution methods, and jurisdictions
Happy coding with Feluda! 🚀