Execution Commands
deno run
Run a JavaScript or TypeScript program, or execute a task from your configuration file.deno serve
Run a server with automatic port binding and request handling.deno task
Run a task defined in your deno.json configuration file.deno repl
Start an interactive Read-Eval-Print Loop (REPL) for Deno.deno eval
Evaluate a script from the command line.Testing & Benchmarking
deno test
Run tests in your project.deno bench
Run benchmarks to measure code performance.Code Quality
deno fmt
Format source files using the built-in code formatter.deno lint
Lint source files for code quality issues.Bundling & Compilation
deno bundle
Bundle your project into optimized JavaScript files.deno compile
Compile a script into a standalone executable.Documentation
deno doc
Generate and show documentation for modules.Dependency Management
deno add
Add dependencies to your project.deno install
Install dependencies or create a global executable.deno remove
Remove dependencies from your configuration file.deno outdated
Find and update outdated dependencies.Utility Commands
deno check
Type-check the dependencies without running.deno info
Show information about cache or source file.deno cache
Cache dependencies.deno clean
Remove the cache directory.deno upgrade
Upgrade Deno to the latest or specified version.Global Flags
These flags are available for most commands:--config <FILE>- Load configuration from a file--no-config- Disable automatic config file detection--import-map <FILE>- Load import map file--lock <FILE>- Check the specified lock file--no-lock- Disable lock file--no-remote- Do not resolve remote modules--reload- Reload source code cache--unstable- Enable unstable features--quiet- Suppress diagnostic output--log-level <LEVEL>- Set log level (trace, debug, info)
Permission Flags
Deno is secure by default. Use these flags to grant permissions:--allow-all- Allow all permissions--allow-env[=<VARIABLE>]- Allow environment access--allow-read[=<PATH>]- Allow file system read access--allow-write[=<PATH>]- Allow file system write access--allow-net[=<DOMAIN>]- Allow network access--allow-run[=<PROGRAM>]- Allow running subprocesses--allow-sys[=<API>]- Allow access to system information--allow-ffi[=<PATH>]- Allow loading dynamic libraries
--deny-* variant for denying specific permissions.