
Implements: custom formatter Custom formatter can be used to output a machine-readable, easily parsable and customizable format using set of predefined tags to suite various needs. Output string is formatted using python string.format() standards and therefore provides familiar usage. Usage: bandit --format custom [--msg-template MSG-TEMPLATE] targets See bandit --help for additional information and list of available tags modified: bandit/cli/main.py modified: bandit/core/manager.py modified: README.rst modified: setup.cfg new file: bandit/formatters/custom.py Change-Id: I900c9689cddb048db58608c443305e05e7a4be14 Signed-off-by: Marek Cermak <macermak@redhat.com>
124 lines
5.1 KiB
INI
124 lines
5.1 KiB
INI
[metadata]
|
|
name = bandit
|
|
summary = Security oriented static analyser for python code.
|
|
description-file =
|
|
README.rst
|
|
author = OpenStack Security Group
|
|
author-email = openstack-dev@lists.openstack.org
|
|
home-page = https://wiki.openstack.org/wiki/Security/Projects/Bandit
|
|
classifier =
|
|
Environment :: OpenStack
|
|
Intended Audience :: Information Technology
|
|
Intended Audience :: System Administrators
|
|
Intended Audience :: Developers
|
|
License :: OSI Approved :: Apache Software License
|
|
Operating System :: POSIX :: Linux
|
|
Operating System :: MacOS :: MacOS X
|
|
Programming Language :: Python
|
|
Programming Language :: Python :: 2
|
|
Programming Language :: Python :: 2.7
|
|
Programming Language :: Python :: 3
|
|
Programming Language :: Python :: 3.5
|
|
Topic :: Security
|
|
|
|
[entry_points]
|
|
console_scripts =
|
|
bandit = bandit.cli.main:main
|
|
bandit-config-generator = bandit.cli.config_generator:main
|
|
bandit-baseline = bandit.cli.baseline:main
|
|
bandit.blacklists =
|
|
calls = bandit.blacklists.calls:gen_blacklist
|
|
imports = bandit.blacklists.imports:gen_blacklist
|
|
bandit.formatters =
|
|
csv = bandit.formatters.csv:report
|
|
json = bandit.formatters.json:report
|
|
txt = bandit.formatters.text:report
|
|
xml = bandit.formatters.xml:report
|
|
html = bandit.formatters.html:report
|
|
screen = bandit.formatters.screen:report
|
|
yaml = bandit.formatters.yaml:report
|
|
custom = bandit.formatters.custom:report
|
|
bandit.plugins =
|
|
# bandit/plugins/app_debug.py
|
|
flask_debug_true = bandit.plugins.app_debug:flask_debug_true
|
|
|
|
# bandit/plugins/asserts.py
|
|
assert_used = bandit.plugins.asserts:assert_used
|
|
|
|
# bandit/plugins/crypto_request_no_cert_validation.py
|
|
request_with_no_cert_validation = bandit.plugins.crypto_request_no_cert_validation:request_with_no_cert_validation
|
|
|
|
# bandit/plugins/exec_as_root.py
|
|
execute_with_run_as_root_equals_true = bandit.plugins.exec_as_root:execute_with_run_as_root_equals_true
|
|
|
|
# bandit/plugins/exec.py
|
|
exec_used = bandit.plugins.exec:exec_used
|
|
|
|
# bandit/plugins/general_bad_File_permissions.py
|
|
set_bad_file_permissions = bandit.plugins.general_bad_file_permissions:set_bad_file_permissions
|
|
|
|
# bandit/plugins/general_bind_all_interfaces.py
|
|
hardcoded_bind_all_interfaces = bandit.plugins.general_bind_all_interfaces:hardcoded_bind_all_interfaces
|
|
|
|
# bandit/plugins/general_hardcoded_password.py
|
|
hardcoded_password_string = bandit.plugins.general_hardcoded_password:hardcoded_password_string
|
|
hardcoded_password_funcarg = bandit.plugins.general_hardcoded_password:hardcoded_password_funcarg
|
|
hardcoded_password_default = bandit.plugins.general_hardcoded_password:hardcoded_password_default
|
|
|
|
# bandit/plugins/general_hardcoded_tmp.py
|
|
hardcoded_tmp_directory = bandit.plugins.general_hardcoded_tmp:hardcoded_tmp_directory
|
|
|
|
# bandit/plugins/injection_paramiko.py
|
|
paramiko_calls = bandit.plugins.injection_paramiko:paramiko_calls
|
|
|
|
# bandit/plugins/injection_shell.py
|
|
subprocess_popen_with_shell_equals_true = bandit.plugins.injection_shell:subprocess_popen_with_shell_equals_true
|
|
subprocess_without_shell_equals_true = bandit.plugins.injection_shell:subprocess_without_shell_equals_true
|
|
any_other_function_with_shell_equals_true = bandit.plugins.injection_shell:any_other_function_with_shell_equals_true
|
|
start_process_with_a_shell = bandit.plugins.injection_shell:start_process_with_a_shell
|
|
start_process_with_no_shell = bandit.plugins.injection_shell:start_process_with_no_shell
|
|
start_process_with_partial_path = bandit.plugins.injection_shell:start_process_with_partial_path
|
|
|
|
# bandit/plugins/injection_sql.py
|
|
hardcoded_sql_expressions = bandit.plugins.injection_sql:hardcoded_sql_expressions
|
|
|
|
# bandit/plugins/injection_wildcard.py
|
|
linux_commands_wildcard_injection = bandit.plugins.injection_wildcard:linux_commands_wildcard_injection
|
|
|
|
# bandit/plugins/insecure_ssl_tls.py
|
|
ssl_with_bad_version = bandit.plugins.insecure_ssl_tls:ssl_with_bad_version
|
|
ssl_with_bad_defaults = bandit.plugins.insecure_ssl_tls:ssl_with_bad_defaults
|
|
ssl_with_no_version = bandit.plugins.insecure_ssl_tls:ssl_with_no_version
|
|
|
|
# bandit/plugins/jinja2_templates.py
|
|
jinja2_autoescape_false = bandit.plugins.jinja2_templates:jinja2_autoescape_false
|
|
|
|
# bandit/plugins/mako_templates.py
|
|
use_of_mako_templates = bandit.plugins.mako_templates:use_of_mako_templates
|
|
|
|
# bandit/plugins/secret_config_options.py
|
|
password_config_option_not_marked_secret = bandit.plugins.secret_config_option:password_config_option_not_marked_secret
|
|
|
|
# bandit/plugins/try_except_continue.py
|
|
try_except_continue = bandit.plugins.try_except_continue:try_except_continue
|
|
|
|
# bandit/plugins/try_except_pass.py
|
|
try_except_pass = bandit.plugins.try_except_pass:try_except_pass
|
|
|
|
# bandit/plugins/weak_cryptographic_key.py
|
|
weak_cryptographic_key = bandit.plugins.weak_cryptographic_key:weak_cryptographic_key
|
|
|
|
# bandit/plugins/yaml_load.py
|
|
yaml_load = bandit.plugins.yaml_load:yaml_load
|
|
|
|
[build_sphinx]
|
|
all_files = 1
|
|
build-dir = doc/build
|
|
source-dir = doc/source
|
|
|
|
[pbr]
|
|
autodoc_tree_index_modules = True
|
|
|
|
[bdist_wheel]
|
|
universal = 1
|