security-scanner
Here are 247 public repositories matching this topic...
This should scan javascript files and javascript in HTML for dangerous JS functions.
See danielmiessler/SecLists#367 which already links to a PR for Angular ones.
Ideally the rule should include the relevant framework in the alert description.
I plan to look at this soonish, but if anyone else fancies a go at a relatively simple passive scan rule then just get in touch
I'm using OpenNTPD instead of the default ntp on my FreeBSD server - when lynis analyses the ntp settings it tries to query information with ntpq which is (to my knowledge) is not possible with OpenNTPD.
Lynis will slow down as ntpq takes a while fail.
OS: FreeBSD 10.4
Lynis: 2.6.1 (768446e4)
[ Lynis 2.6.1 ]
####################################################################
Would be good to add a check for the wpeprivate/config.json file that apparently contains sensitive information.
I've yet to find an example of what one looks like.
References:
https://twitter.com/bugbountynights/status/1198392055044755456?s=19
-
Updated
Mar 9, 2020 - C#
At certain sizes just before the layout changes from horizontal to vertical, items in the configuration page wrap poorly:
This is probably most easily fixed by adjusting the media queries being used to snap to the vertical layout slightly sooner.
Describe the bug
The doc for B324 hashlib_new is not included as part of:
https://bandit.readthedocs.io/en/latest/plugins/index.html
This may be because 3xx is for blacklist, yet this is a plugin.
To Reproduce
Steps to reproduce the behavior:
- Go tohttps://bandit.readthedocs.io/en/latest/plugins/index.html
- Notice B324 is missing in the list of plugins
Note, it is not lis
System and Python Environment
| Item | Tooltip | Value |
|---|---|---|
| System | uname -a |
|
| Python | python -V |
|
| Cobra | python cobra.py |
Description
[Description of the bug or feature]
Steps to Reproduce
if 'tag' in (self.repo_branch).lower():
cmd='git clone ' + clone_address + ' "' + self.repo_directory+ '" '+'; cd '+self.repo_directory+'; git che
-
Updated
Mar 9, 2020
-
Updated
Mar 8, 2020 - Python
-
Updated
Mar 8, 2020 - Lua
-
Updated
Mar 7, 2020 - Python
-
Updated
Mar 9, 2020 - Python
-
Updated
Mar 9, 2020 - C#
-
Updated
Mar 6, 2020 - Python
-
Updated
Feb 28, 2020 - Python
-
Updated
Mar 9, 2020 - Python
-
Updated
Mar 7, 2020 - C++
now that we're getting a few more contributers, standardize on ubuntu / osx as the dev os, and include more instructions here: https://github.com/intrigueio/intrigue-core/wiki/Setting-up-a-Test-Environment-on-Ubuntu-Linux
-
Updated
Mar 8, 2020 - Python
-
Updated
Mar 8, 2020 - Perl
-
Updated
Mar 8, 2020
-
Updated
Mar 8, 2020
It would be good if Kube Score could be ran against resources that are already deployed on the cluster. This could be as simple as exporting the resource into local yaml an executing kube score against it, but this would open the door for kube score being ran regularly against an existing cluster.
-
Updated
Mar 8, 2020 - Python
-
Updated
Mar 7, 2020 - Java
There should be a first class command to check the api status of a given key, like the current credits. This could be done with a regular script that takes a keypair as input.
-
Updated
Mar 3, 2020 - JavaScript
-
Updated
Mar 8, 2020
To successfully install Yasuo on the latest version of Kali, the bundle commands mentioned in the README.md file were unsuccessful. Instead the following commands did install it correctly:
sudo apt-get install zlib1g-dev libsqlite3-dev
bundle install --path vendor --gemfile ./Gemfile
To run Yasuo:
bundler exec "./yasuo.rb --help"
Improve this page
Add a description, image, and links to the security-scanner topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the security-scanner topic, visit your repo's landing page and select "manage topics."



Currently there's possiblity to make "one-liner scan" of system using curl (https://vuls.io/docs/en/usage-server.html). Issue is, that received JSON can't be displayed nicely with application, because application always want's to get the data from vulnerability DB (even there's everything needed in the JSON returned by vul