mirror of
https://github.com/cve-search/git-vuln-finder.git
synced 2024-11-25 16:27:20 +00:00
Renamed command line.
This commit is contained in:
parent
0b31bc36b2
commit
dfa15c119d
2 changed files with 4 additions and 4 deletions
|
@ -28,14 +28,14 @@ $ poetry shell
|
|||
|
||||
~~~bash
|
||||
$ pipx install git-vuln-finder
|
||||
$ finder --help
|
||||
$ git-vuln-finder --help
|
||||
~~~
|
||||
|
||||
|
||||
# Usage
|
||||
|
||||
~~~bash
|
||||
usage: finder.py [-h] [-v] [-r R] [-o O] [-s S] [-p P] [-c] [-t]
|
||||
usage: git-vuln-finder [-h] [-v] [-r R] [-o O] [-s S] [-p P] [-c] [-t]
|
||||
|
||||
Finding potential software vulnerabilities from git commit messages.
|
||||
|
||||
|
@ -66,7 +66,7 @@ git-vuln-finder comes with 3 default patterns which can be selected to find the
|
|||
## A sample partial output from Curl git repository
|
||||
|
||||
~~~bash
|
||||
python3 finder.py -r /home/adulau/git/curl | jq .
|
||||
$ git-vuln-finder -r /home/adulau/git/curl | jq .
|
||||
...
|
||||
"6df916d751e72fc9a1febc07bb59c4ddd886c043": {
|
||||
"message": "loadlibrary: Only load system DLLs from the system directory\n\nInspiration provided by: Daniel Stenberg and Ray Satiro\n\nBug: https://curl.haxx.se/docs/adv_20160530.html\n\nRef: Windows DLL hijacking with curl, CVE-2016-4802\n",
|
||||
|
|
|
@ -42,7 +42,7 @@ include = [
|
|||
]
|
||||
|
||||
[tool.poetry.scripts]
|
||||
finder = "bin.finder:main"
|
||||
git-vuln-finder = "bin.finder:main"
|
||||
|
||||
[tool.poetry.dependencies]
|
||||
python = "^3.6"
|
||||
|
|
Loading…
Reference in a new issue