Usage
Description
Verify the integrity of installed components by computing SHA-256 hashes and comparing them against the recorded values in the receipt file (.ocx/receipt.jsonc). Detects unauthorized modifications or corruption.
Arguments
| Argument | Required | Description |
|---|---|---|
components... | No | Specific components to verify (verifies all if omitted) |
Flags
| Flag | Shorthand | Default | Description |
|---|---|---|---|
--cwd <path> | Current directory | Working directory | |
--quiet | -q | false | Suppress output |
--verbose | -v | false | Verbose output |
--json | false | Output as JSON |
Examples
Verify All Installed Components
Verify a Specific Component
Verbose Output Showing All Files
See Also
- Security Verification — How SHA-256 verification works.
- Enterprise Overview — Integrity verification in team environments.
- CLI Reference — All commands.