MLVScan.DevCLI 1.0.1

dotnet tool install --global MLVScan.DevCLI --version 1.0.1
                    
This package contains a .NET tool you can call from the shell/command line.
dotnet new tool-manifest
                    
if you are setting up this repo
dotnet tool install --local MLVScan.DevCLI --version 1.0.1
                    
This package contains a .NET tool you can call from the shell/command line.
#tool dotnet:?package=MLVScan.DevCLI&version=1.0.1
                    
nuke :add-package MLVScan.DevCLI --version 1.0.1
                    

MLVScan.DevCLI

Developer CLI tool for MLVScan - scan MelonLoader mods during development with remediation guidance.

Installation

Install as a global .NET tool:

dotnet tool install --global MLVScan.DevCLI

Or install locally in your project:

dotnet new tool-manifest  # if you don't have one already
dotnet tool install MLVScan.DevCLI

Updating

If installed as a global .NET tool:

dotnet tool update --global MLVScan.DevCLI

Or if installed locally in your project:

dotnet tool update MLVScan.DevCLI

Usage

Basic Scan

Scan a mod DLL and get developer-friendly output:

mlvscan-dev MyMod.dll

JSON Output (for CI/CD)

Get machine-readable JSON output:

mlvscan-dev MyMod.dll --json

Fail Build on High Severity

Exit with error code 1 if findings of High or Critical severity are found:

mlvscan-dev MyMod.dll --fail-on High

Verbose Mode

Show all findings, even those without developer guidance:

mlvscan-dev MyMod.dll --verbose

MSBuild Integration

Add MLVScan checks to your build process by adding this to your .csproj:

Note: The output of the DevCLI may be hidden when using the dotnet CLI. Use an IDE like Visual Studio or Rider to see the full output of the DevCLI.

Option 1: Post-Build Check (Recommended for Development)

<Target Name="MLVScanCheck" AfterTargets="Build">
  <Exec Command="dotnet mlvscan-dev $(TargetPath)" />
</Target>

Option 2: Fail Build on Issues

<Target Name="MLVScanCheck" AfterTargets="Build">
  <Exec Command="dotnet mlvscan-dev $(TargetPath) --fail-on High" />
</Target>

Option 3: JSON Output for CI/CD

<Target Name="MLVScanCheck" AfterTargets="Build">
  <Exec Command="dotnet mlvscan-dev $(TargetPath) --json > mlvscan-report.json" />
</Target>

Complete Example Project Configuration

Here's a complete example of a mod project with MLVScan integration:

<Project Sdk="Microsoft.NET.Sdk">
  <PropertyGroup>
    <TargetFramework>netstandard2.1</TargetFramework>
    <AssemblyName>MyAwesomeMod</AssemblyName>
  </PropertyGroup>

  
  <ItemGroup>
    <PackageReference Include="MelonLoader" Version="0.6.1" />
  </ItemGroup>

  
  <ItemGroup>
    <PackageReference Include="MLVScan.DevCLI" Version="1.0.0">
      <PrivateAssets>all</PrivateAssets>
      <IncludeAssets>runtime; build; native; contentfiles; analyzers</IncludeAssets>
    </PackageReference>
  </ItemGroup>

  
  <Target Name="MLVScanCheck" AfterTargets="Build" Condition="'$(Configuration)' == 'Debug'">
    <Exec Command="dotnet mlvscan-dev &quot;$(TargetPath)&quot;" 
          ContinueOnError="true" 
          IgnoreExitCode="true" />
  </Target>

  
  <Target Name="MLVScanCheckRelease" AfterTargets="Build" Condition="'$(Configuration)' == 'Release'">
    <Exec Command="dotnet mlvscan-dev &quot;$(TargetPath)&quot; --fail-on Critical" />
  </Target>
</Project>

Command-Line Options

Usage:
  mlvscan-dev <assembly-path> [options]

Arguments:
  <assembly-path>  Path to the .dll file to scan

Options:
  -j, --json              Output results as JSON (useful for CI/CD pipelines)
  -f, --fail-on <value>   Exit with error code 1 if findings >= severity (Low/Medium/High/Critical)
  -v, --verbose           Show all findings, not just those with developer guidance
  -h, --help              Show help information
  --version               Show version information

Output Examples

Console Output

MLVScan Developer Report
========================
Assembly: MyMod.dll
Findings: 2

[High] Detected executable write near persistence-prone directory
  Rule: PersistenceRule
  Occurrences: 1

  Developer Guidance:
  For mod settings, use MelonPreferences. For save data, use the game's
  save system or Application.persistentDataPath with .json extension.
  📚 https://melonwiki.xyz/#/modders/preferences
  Suggested APIs: MelonPreferences.CreateEntry<T>

  Locations:
    • MyMod.SaveManager.SaveSettings:42

─────────────────────────────────────────

JSON Output

{
  "assemblyName": "MyMod.dll",
  "totalFindings": 2,
  "findings": [
    {
      "ruleId": "PersistenceRule",
      "description": "Detected executable write near persistence-prone directory",
      "severity": "High",
      "location": "MyMod.SaveManager.SaveSettings:42",
      "codeSnippet": "...",
      "guidance": {
        "remediation": "For mod settings, use MelonPreferences...",
        "documentationUrl": "https://melonwiki.xyz/#/modders/preferences",
        "alternativeApis": ["MelonPreferences.CreateEntry<T>"],
        "isRemediable": true
      }
    }
  ]
}

CI/CD Integration Examples

GitHub Actions

name: Build and Scan

on: [push, pull_request]

jobs:
  build:
    runs-on: windows-latest
    steps:
      - uses: actions/checkout@v3
      
      - name: Setup .NET
        uses: actions/setup-dotnet@v3
        with:
          dotnet-version: '8.0.x'
      
      - name: Install MLVScan.DevCLI
        run: dotnet tool install --global MLVScan.DevCLI
      
      - name: Build
        run: dotnet build -c Release
      
      - name: Scan for issues
        run: mlvscan-dev ./bin/Release/netstandard2.1/MyMod.dll --json > scan-results.json
      
      - name: Upload scan results
        uses: actions/upload-artifact@v3
        with:
          name: mlvscan-results
          path: scan-results.json

GitLab CI

stages:
  - build
  - scan

build:
  stage: build
  script:
    - dotnet build -c Release
  artifacts:
    paths:
      - bin/Release/

scan:
  stage: scan
  script:
    - dotnet tool install --global MLVScan.DevCLI
    - mlvscan-dev ./bin/Release/netstandard2.1/MyMod.dll --json > scan-results.json
    - mlvscan-dev ./bin/Release/netstandard2.1/MyMod.dll --fail-on Critical
  artifacts:
    reports:
      mlvscan: scan-results.json

Understanding the Output

Severity Levels

  • Critical: Serious security violations (e.g., shell execution, Discord webhooks)
  • High: Potentially dangerous patterns (e.g., registry access, DLL imports)
  • Medium: Suspicious patterns that may be legitimate (e.g., encoded strings)
  • Low: Informational findings (e.g., Base64 usage)

Developer Guidance

Each finding may include:

  • Remediation: Specific advice on how to fix the issue
  • Documentation URL: Link to relevant MelonLoader documentation
  • Alternative APIs: Suggested safe APIs to use instead
  • IsRemediable: Whether a safe alternative exists

If IsRemediable is false, the pattern has no safe alternative and should not be used in MelonLoader mods.

FAQ

Q: Will this slow down my build?

A: The scan typically takes 1-2 seconds for most mods. You can disable it in Debug builds or use ContinueOnError="true" to make it non-blocking.

Q: What if I get false positives?

A: The developer guidance will help you understand why something was flagged and how to fix it. If you believe it's a legitimate false positive, you can:

  1. Refactor your code using the suggested alternatives
  2. Contact the MLVScan maintainers in the Discord
  3. Add your mod's hash to the whitelist after community review

Q: Can I use this for closed-source mods?

A: Yes! The tool works on compiled DLLs and doesn't require source code access.

Support

License

MIT License - See LICENSE file for details

Product Compatible and additional computed target framework versions.
.NET net8.0 is compatible.  net8.0-android was computed.  net8.0-browser was computed.  net8.0-ios was computed.  net8.0-maccatalyst was computed.  net8.0-macos was computed.  net8.0-tvos was computed.  net8.0-windows was computed.  net9.0 was computed.  net9.0-android was computed.  net9.0-browser was computed.  net9.0-ios was computed.  net9.0-maccatalyst was computed.  net9.0-macos was computed.  net9.0-tvos was computed.  net9.0-windows was computed.  net10.0 was computed.  net10.0-android was computed.  net10.0-browser was computed.  net10.0-ios was computed.  net10.0-maccatalyst was computed.  net10.0-macos was computed.  net10.0-tvos was computed.  net10.0-windows was computed. 
Compatible target framework(s)
Included target framework(s) (in package)
Learn more about Target Frameworks and .NET Standard.

This package has no dependencies.

Version Downloads Last Updated
1.0.1 94 1/4/2026
1.0.0 90 1/4/2026