baselineFree
Creates the trusted reference state that the rest of the workflow depends on. Baseline Scan is the foundation of the free CLI model.
Docs · Use Cases
AuditWalk is built around a Baseline-first workflow, and the free CLI already provides meaningful tools for establishing trusted state, running targeted checks, and detecting drift over time.
While the broader AuditWalk platform extends into interpretation and repair planning, the currently available command-line tools are already useful for disciplined, evidence-based review.
The examples below focus on how the free CLI can be used in practice. They show how Baseline Scan creation, PreFlight checks, and Compare runs help users verify change, investigate drift, and build a clear understanding of what happened before deciding what to do next.
baselineFree
Creates the trusted reference state that the rest of the workflow depends on. Baseline Scan is the foundation of the free CLI model.
preflightFree
Runs a narrower, targeted check using the active baseline as reference. Useful when you want faster focused review without immediately running full Compare.
compareFree
Performs full drift detection against the confirmed baseline. This is the core free CLI command for measuring what changed.
doctorPaid / Coming
Interprets Compare output and helps explain what findings likely mean. Extends the workflow, but free Baseline/PreFlight/Compare already provide practical value.
repairPaid / Coming
Builds scoped repair plans from confirmed findings. Like Doctor, this extends the workflow beyond observation and comparison.
Supporting Commands
inspect, report, trust, status, full
Free CLI: baseline, preflight, compare, inspect, report, trust, status, full
Paid / Coming: doctor, repair (platform extension)
Use Case 01 — Crypto & Blockchain
You're about to make a significant transaction — transferring crypto, signing a contract on-chain, or moving funds between wallets. Your system has been running for a few days. Browser extensions have updated. You've run a few scripts. You want to know that nothing in your environment has changed in a way that could intercept or redirect what you're about to do.
Establish your baseline on a known-clean system
The first time you use AuditWalk — ideally right after a fresh install or a point you trust — you run a full scan and confirm it as your baseline. This becomes the reference everything is measured against.
auditwalk scan run --profile full
auditwalk baseline set --scan-id <scan_id>
✓ Scan complete — scan_00041
✓ Baseline Scan completed — 48,219 paths recorded
Baseline is now active. Run preflight or compare at any time.
Run a preflight before the transaction
Before you open your wallet or connect to any exchange, run a targeted preflight scoped to the areas most likely to be compromised — browser profile, system startup entries, and crypto-related paths.
auditwalk preflight run --scope browser,system,crypto
✓ Preflight complete — browser, system, crypto
Compared against baselined 3 days ago
Findings: 0
✓ CLEAR — no drift detected in scoped areas
Proceed, then compare after the transaction
After the transaction completes, run a full compare. This documents the post-transaction state and gives you a record of anything that changed during the session.
auditwalk compare run
auditwalk report render --format md --out ./post-transaction-report.md
If drift is detected, run doctor before acting
If compare surfaces findings, doctor interprets them and tells you what they mean in context — whether they're expected browser cache changes or something worth investigating before you transact again.
auditwalk doctor
What good looks like
Preflight returns zero findings in browser, system, and crypto scopes. The output reads CLEAR. You proceed with confidence knowing your environment matches the state you confirmed as trusted.
✓ CLEAR — 0 findings
browser: 0 system: 0 crypto: 0
Compared against baseline artifact scan_00041
What to investigate
A new browser extension appears, or a startup entry you don't recognise has been added. Don't proceed with the transaction until doctor has assessed the finding and you've resolved it or confirmed it as expected.
! ATTENTION — 2 findings
~ browser extension modified
~/.config/chromium/Default/Extensions/
+ new startup entry detected
/etc/systemd/system/update-helper.service
Use Case 02 — Autonomous Agents
You're running an automated workflow — a local agent that browses, writes files, executes scripts, or manages your environment on your behalf. The agent has legitimate access to your system. The question isn't whether it's supposed to be there — it's whether everything it changed was intentional and expected.
Snapshot before the agent run
Before triggering the agent, capture the current system state. If you already have a confirmed baseline, run a fresh scan so you have a timestamped pre-run artifact to compare against.
auditwalk scan run --profile full
✓ Scan complete — scan_00089
48,312 paths recorded at 14:22:07
Run your agent workflow
Execute the agent task as normal. AuditWalk is passive — it doesn't interfere with or monitor the agent in real time. The comparison happens after the fact against the snapshot you just captured.
Compare against the pre-run snapshot
After the agent completes, run a compare to surface every filesystem change the session produced. This gives you a factual record of what the agent did — useful both for verification and for building a log of agent activity over time.
auditwalk compare run
auditwalk attention show
✓ Compare complete
Drift detected: 14 changes
+ 11 files added (expected — agent output)
~ 2 files modified (expected — config updates)
+ 1 file added (unexpected — review required)
/etc/cron.d/agent-persist
Doctor reviews the findings
Doctor reads the compare output and assesses each finding — distinguishing expected agent activity from anything that warrants investigation. In this case, a new cron entry that wasn't part of the task definition gets flagged for review.
auditwalk doctor
Reviewing 14 findings from compare run...
✓ 13 findings assessed as expected agent activity
! 1 finding requires attention
/etc/cron.d/agent-persist
Severity: HIGH
A persistence entry was added outside the agent's declared
task scope. This path was not present before the run and
does not match known agent output patterns.
Recommendation: inspect before next agent execution.
Inspect the flagged finding, then decide
Use inspect to drill into the specific finding. If it's legitimate — something your agent is supposed to add — you can acknowledge it and update your baseline. If it's not, repair will generate a plan to remove it.
auditwalk inspect /etc/cron.d/agent-persist
What good looks like
Every change the agent made is accounted for and matches what the task was supposed to do. Doctor confirms all findings as expected. You update your baseline to reflect the new trusted state.
✓ All 14 findings assessed
✓ No unexpected activity detected
Recommend: confirm new baseline to record agent output
What to investigate
Startup entries, cron jobs, or new executables that weren't part of the agent's declared task. New entries in system paths the agent had no reason to touch. Any modification to browser profiles or authentication files.
! Unexpected persistence entry
! New executable in /usr/local/bin/
~ Browser profile modified outside agent scope
Use Case 03 — IT Service Providers
A customer brings in a machine. You clean it up, remove malware, update software, and return it. Three weeks later they call back: it's running slow, something's not right. Without a baseline from when the machine left your shop, you're diagnosing blind. With one, you have a structured diff of exactly what changed between then and now.
Baseline the machine before it leaves your shop
After you've completed your work and the machine is in a known-good state, run a full scan and run Baseline Scan. Label it clearly so you can identify it when the customer calls back.
auditwalk scan run --profile full
auditwalk baseline set --scan-id <scan_id>
✓ Scan complete — scan_00012
✓ Baseline Scan completed
Label: customer-smithj-post-repair-2026-03-15
42,108 paths recorded
On callback — run a compare immediately
When the customer brings the machine back or calls reporting issues, the first thing you do is run a compare against the baseline you set at last service. This gives you a structured list of everything that changed since the machine left your shop.
auditwalk compare run
✓ Compare complete
Compared against baseline: customer-smithj-post-repair-2026-03-15
Drift detected: 47 changes
~ 31 system/package updates (expected)
+ 9 new browser extensions
+ 4 new startup entries
+ 3 new executables in user paths
Run doctor to prioritise the findings
Doctor reads the compare output and ranks the findings by severity, separating routine changes from items requiring investigation. This saves you the time of manually reviewing every changed file.
auditwalk doctor
Reviewing 47 findings...
✓ 31 findings: routine system updates — no action needed
! 9 findings: browser extensions — review recommended
! 7 findings: HIGH severity — action required
new startup entry: /etc/systemd/system/ms-update.service
new startup entry: /etc/init.d/browser-helper
new executable: /usr/local/bin/sys-monitor
(+ 4 more — run attention show for full list)
Generate a repair plan and review it with the customer
Repair produces a step-by-step plan for resolving the high-severity findings. Crucially, nothing executes until you approve each action — you can review the plan with the customer before making any changes.
auditwalk repair plan
auditwalk report render --format md --out ./smithj-callback-report.md
What good looks like
Compare shows only expected changes — OS updates, application patches, user-installed software. Doctor confirms no high-severity findings. You export the report, update the baseline, and return the machine with a clean bill of health and documentation to prove it.
✓ 47 findings — all assessed LOW or INFO
✓ No unexpected persistence or executables
Ready to export report and update baseline
What to investigate
Startup entries with names imitating legitimate services. New executables in system or user paths the customer didn't install. Browser extensions added after the repair date. Any modification to authentication or credential files.
! Startup entry mimics system service name
! Executable added to PATH after repair date
~ SSH config modified — verify with customer
Use Case 04 — Developers & SRE
You maintain a Linux environment that's been running for months. Packages update, cron jobs accumulate, config files drift from their intended state. Something is behaving differently — slightly slower, an intermittent error, a service that restarts more than it should. You want a structured diff between the system as it is now and the system as it was when everything last worked correctly.
Establish a baseline at a known-good state
After a clean deploy, a successful rollout, or any point you consider a reliable reference, run a full scan and run Baseline Scan. This is the state you'll compare future runs against.
auditwalk scan run --profile full
auditwalk baseline set --scan-id <scan_id>
Run preflight regularly as a lightweight check
Rather than a full compare every time, use preflight scoped to the areas most likely to drift — system configs, executables, startup entries. It's fast enough to run before a deployment or at the start of an on-call shift.
auditwalk preflight run --scope system,files
✓ Preflight complete — system, files
Compared against baseline from 2026-03-01
~ 3 config files modified
Run compare for full details
Full compare when preflight flags drift
When preflight finds something, run a full compare to get the complete picture. The compare artifact contains structured JSON output you can feed directly into your alerting or logging pipeline.
auditwalk compare run
auditwalk compare export --format json --out ./drift-report.json
✓ Compare complete — 3 findings
~ /etc/nginx/nginx.conf modified
~ /etc/systemd/system/app.service modified
~ /usr/local/bin/deploy-hook modified
Doctor identifies the root cause
Doctor reads the compare findings and tells you which changes are likely to be causing the behaviour you're seeing, with enough context to act on it without manually diffing every file.
auditwalk doctor
Reviewing 3 findings...
! nginx.conf — worker_processes value changed
Before: worker_processes auto;
After: worker_processes 1;
Assessment: likely cause of degraded throughput under load.
~ app.service — restart policy tightened (expected)
~ deploy-hook — timestamp only, no functional change
What good looks like
Preflight returns clean on system and files scope. Compare after a deploy shows only the files you changed intentionally. JSON output lands cleanly in your pipeline. Baseline updated to reflect the new deployed state.
✓ CLEAR — 0 unexpected findings
3 expected changes from deploy confirmed
Baseline updated: scan_00203
What to investigate
Config files modified outside a deployment window. New cron entries or startup hooks you didn't add. Executables that changed outside a package update cycle. Any modification to files that should be immutable between deploys.
! cron entry added outside deploy window
~ /etc/hosts modified — verify intent
! binary changed outside package manager
Use Case 05 — After Remote Access
You allowed someone access to your machine — a support technician, a friend helping remotely, or someone who convinced you to share your screen or install a remote desktop tool. The session is over. You want to know what they did while they had access. Maybe you're confident it was fine. Maybe you're not. Either way, you want evidence rather than assumption.
If you have a pre-session baseline, run compare now
If you had the foresight to run a scan and confirm a baseline before the session, you can immediately compare against it to see everything that changed while the other person had access.
auditwalk compare run
✓ Compare complete
Compared against baselined before remote session
Drift detected: 8 changes
If you don't have a baseline, start one now
If this is your first time using AuditWalk and you don't have a pre-session baseline, run a scan now and confirm it. It won't tell you what changed during the session you just had — but it gives you a clean reference point for everything going forward. From this point you're protected.
auditwalk scan run --profile full
auditwalk baseline set --scan-id <scan_id>
Run doctor to interpret the findings
Doctor reads the compare output and distinguishes expected changes — software that was legitimately updated, files the technician was supposed to touch — from anything that looks out of place. The assessment is specific and path-level, not generic.
auditwalk doctor
Reviewing 8 findings...
✓ 5 findings: expected — driver updates and log files
! 3 findings: HIGH severity
new executable: /usr/local/bin/sys-helper
new cron entry: /etc/cron.d/update-check
modified file: ~/.ssh/authorized_keys
Assessment: these changes are not consistent with a
routine support session. Recommend repair before
next sensitive activity.
Review the repair plan before acting
Repair generates a step-by-step plan for removing or reversing the concerning changes. You review every action before anything executes. Nothing happens without your explicit approval.
auditwalk repair plan
Repair plan — 3 actions
1. Remove /usr/local/bin/sys-helper
Hash: a3f9c... — not present in baseline
Action: delete — requires sudo
2. Remove /etc/cron.d/update-check
Added during session window
Action: delete — requires sudo
3. Restore ~/.ssh/authorized_keys
Modified during session — baseline version available
Action: restore from baseline artifact
Review complete. Run: auditwalk repair execute to apply.
What good looks like
Compare shows only the changes you expected — the driver update, the file the technician said they'd modify. Doctor confirms all findings as consistent with the stated purpose of the session. You have a documented record of the session's effect on your system.
✓ 4 findings — all consistent with support session
✓ No unexpected persistence, executables, or auth changes
Session documented. Baseline updated.
What to investigate
New executables with generic names. Cron entries added during the session window. Any modification to SSH authorized keys, browser profiles, or credential files. Startup entries that weren't there before the session.
! authorized_keys modified during session
! new executable — not in baseline
! cron entry added — investigate before proceeding
Use Case 06 — Suspicious Activity
You clicked a link that didn't look right. A download started that you didn't expect. An installer ran and you're not entirely sure what it installed. You want to know — specifically and factually — whether anything on your system changed as a result. Not a virus scan that tells you it's clean. Actual evidence of what changed and what didn't.
Run a targeted preflight immediately
If you have a confirmed baseline, run preflight immediately — scoped to the areas most likely to be affected by a malicious download. The faster you run it, the cleaner the signal. Don't reboot first if you can help it.
auditwalk preflight run --scope browser,system,files
✓ Preflight complete — browser, system, files
Compared against baselined 6 days ago
! ATTENTION — 2 findings require review
Run a full compare to see everything
After preflight gives you an initial picture, run a full compare to catch anything outside the scoped areas. Suspicious downloads sometimes target paths you wouldn't think to check first.
auditwalk compare run
✓ Compare complete
Drift detected: 3 changes
+ new file: ~/Downloads/installer.sh
+ new file: /usr/local/bin/update-helper
~ modified: ~/.bashrc
Doctor tells you what the findings mean
Doctor reads the compare output and tells you which findings are concerning and why. It doesn't just list what changed — it gives you context: what the file appears to do, why it's in a concerning location, and what the recommended response is.
auditwalk doctor
Reviewing 3 findings...
~ ~/Downloads/installer.sh — download artifact, low risk if not executed
! /usr/local/bin/update-helper — HIGH
Executable placed in PATH. Name follows a common
masquerade pattern for persistence tools.
Not present in baseline. Not associated with a
known package manager transaction.
Recommendation: do not execute. Review and remove.
! ~/.bashrc — MEDIUM
A PATH addition was appended to your shell config.
This causes /usr/local/bin/ to be searched before
system paths on login.
Recommendation: review the appended line and restore
if not intentional.
Generate a repair plan and review before acting
Repair produces a specific, reviewable plan for each finding. For the executable in PATH, it proposes deletion. For the bashrc modification, it shows you exactly what was added and offers to restore the baseline version. You approve each action individually.
auditwalk repair plan
What good looks like
Compare returns zero findings or only the download file itself in your Downloads folder. Doctor confirms nothing was executed or installed. You have factual evidence the click didn't result in any system change — which is often exactly the reassurance you need.
✓ CLEAR — 1 finding
~/Downloads/suspicious-file.pdf
✓ Download artifact only — no execution detected
✓ No system paths, startup entries, or configs modified
What to investigate
New executables in PATH locations. Modifications to shell config files like .bashrc, .profile, or .zshrc. New startup entries or cron jobs. Browser extension changes that happened at the same time as the download.
! Executable added to PATH location
! Shell config modified — PATH manipulation
! Browser extension added in same time window