From 0a4fd6da6147ea20e082fff8641e52b3f236ffa7 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Mon, 3 Jan 2022 15:16:05 +0100 Subject: [PATCH] chg: [doc] usage updated --- README.md | 10 ++++------ 1 file changed, 4 insertions(+), 6 deletions(-) diff --git a/README.md b/README.md index 49e6331..85a481c 100644 --- a/README.md +++ b/README.md @@ -93,7 +93,7 @@ into separate virtualenvs to shield them from your system and each other. ### Usage ~~~bash -usage: git-vuln-finder [-h] [-v] [-r R] [-o O] [-s S] [-p P] [-c] [-t] +usage: git-vuln-finder [-h] [-v] [-r R] [-o O] [-s S] [-p P] [-c] [-t] [-gh GH] Finding potential software vulnerabilities from git commit messages. @@ -103,12 +103,10 @@ optional arguments: -r R git repository to analyse -o O Output format: [json] -s S State of the commit found - -p P Matching pattern to use: [vulnpatterns, cryptopatterns, - cpatterns] - the pattern 'all' is used to match all the patterns - at once. - -c output only a list of the CVE pattern found in commit messages - (disable by default) + -p P Matching pattern to use: [vulnpatterns, cryptopatterns, cpatterns] - the pattern 'all' is used to match all the patterns at once. + -c output only a list of the CVE pattern found in commit messages (disable by default) -t Include tags matching a specific commit + -gh GH special option for gharchive, pass a file containing a PushEvent in JSON format More info: https://github.com/cve-search/git-vuln-finder ~~~