It would be very helpful if bumblebee also inventoried installed homebrew packages, which is another visibility gap from traditional EDR/MDM that has relevance to vulnerability management and supply-chain response.
Basic information about installed formulae should be collectable just by walking the Homebrew dir (e.g. /opt/homebrew/Cellar/<formula>/<version>/ for Apple Silicon, /usr/local/Cellar/<formula>/<version>/ for Intel, /home/linuxbrew/.linuxbrew for Linux), with more details gatherable from the INSTALL_RECEIPT.json file generated inside each dir.
Similar paths exist for casks.
It would be very helpful if bumblebee also inventoried installed homebrew packages, which is another visibility gap from traditional EDR/MDM that has relevance to vulnerability management and supply-chain response.
Basic information about installed formulae should be collectable just by walking the Homebrew dir (e.g.
/opt/homebrew/Cellar/<formula>/<version>/for Apple Silicon,/usr/local/Cellar/<formula>/<version>/for Intel,/home/linuxbrew/.linuxbrewfor Linux), with more details gatherable from theINSTALL_RECEIPT.jsonfile generated inside each dir.Similar paths exist for casks.