forked from PyCQA/bandit
-
Notifications
You must be signed in to change notification settings - Fork 0
/
setup.cfg
132 lines (107 loc) · 5.37 KB
/
setup.cfg
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
[metadata]
name = bandit
summary = Security oriented static analyser for python code.
description-file =
README.rst
author = PyCQA
author-email = [email protected]
home-page = https://bandit.readthedocs.io/en/latest/
classifier =
Development Status :: 5 - Production/Stable
Environment :: Console
Intended Audience :: Information Technology
Intended Audience :: System Administrators
Intended Audience :: Developers
License :: OSI Approved :: Apache Software License
Operating System :: POSIX :: Linux
Operating System :: MacOS :: MacOS X
Programming Language :: Python
Programming Language :: Python :: 2
Programming Language :: Python :: 2.7
Programming Language :: Python :: 3
Programming Language :: Python :: 3.5
Programming Language :: Python :: 3.6
Programming Language :: Python :: 3.7
Topic :: Security
[entry_points]
console_scripts =
bandit = bandit.cli.main:main
bandit-config-generator = bandit.cli.config_generator:main
bandit-baseline = bandit.cli.baseline:main
bandit.blacklists =
calls = bandit.blacklists.calls:gen_blacklist
imports = bandit.blacklists.imports:gen_blacklist
bandit.formatters =
csv = bandit.formatters.csv:report
json = bandit.formatters.json:report
txt = bandit.formatters.text:report
xml = bandit.formatters.xml:report
html = bandit.formatters.html:report
screen = bandit.formatters.screen:report
yaml = bandit.formatters.yaml:report
custom = bandit.formatters.custom:report
bandit.plugins =
# bandit/plugins/app_debug.py
flask_debug_true = bandit.plugins.app_debug:flask_debug_true
# bandit/plugins/asserts.py
assert_used = bandit.plugins.asserts:assert_used
# bandit/plugins/crypto_request_no_cert_validation.py
request_with_no_cert_validation = bandit.plugins.crypto_request_no_cert_validation:request_with_no_cert_validation
# bandit/plugins/exec.py
exec_used = bandit.plugins.exec:exec_used
# bandit/plugins/general_bad_File_permissions.py
set_bad_file_permissions = bandit.plugins.general_bad_file_permissions:set_bad_file_permissions
# bandit/plugins/general_bind_all_interfaces.py
hardcoded_bind_all_interfaces = bandit.plugins.general_bind_all_interfaces:hardcoded_bind_all_interfaces
# bandit/plugins/general_hardcoded_password.py
hardcoded_password_string = bandit.plugins.general_hardcoded_password:hardcoded_password_string
hardcoded_password_funcarg = bandit.plugins.general_hardcoded_password:hardcoded_password_funcarg
hardcoded_password_default = bandit.plugins.general_hardcoded_password:hardcoded_password_default
# bandit/plugins/general_hardcoded_tmp.py
hardcoded_tmp_directory = bandit.plugins.general_hardcoded_tmp:hardcoded_tmp_directory
# bandit/plugins/injection_paramiko.py
paramiko_calls = bandit.plugins.injection_paramiko:paramiko_calls
# bandit/plugins/injection_shell.py
subprocess_popen_with_shell_equals_true = bandit.plugins.injection_shell:subprocess_popen_with_shell_equals_true
subprocess_without_shell_equals_true = bandit.plugins.injection_shell:subprocess_without_shell_equals_true
any_other_function_with_shell_equals_true = bandit.plugins.injection_shell:any_other_function_with_shell_equals_true
start_process_with_a_shell = bandit.plugins.injection_shell:start_process_with_a_shell
start_process_with_no_shell = bandit.plugins.injection_shell:start_process_with_no_shell
start_process_with_partial_path = bandit.plugins.injection_shell:start_process_with_partial_path
# bandit/plugins/injection_sql.py
hardcoded_sql_expressions = bandit.plugins.injection_sql:hardcoded_sql_expressions
# bandit/plugins/hashlib_new_insecure_functions.py
hashlib_new_insecure_functions = bandit.plugins.hashlib_new_insecure_functions:hashlib_new
# bandit/plugins/injection_wildcard.py
linux_commands_wildcard_injection = bandit.plugins.injection_wildcard:linux_commands_wildcard_injection
# bandit/plugins/django_sql_injection.py
django_extra_used = bandit.plugins.django_sql_injection:django_extra_used
django_rawsql_used = bandit.plugins.django_sql_injection:django_rawsql_used
# bandit/plugins/insecure_ssl_tls.py
ssl_with_bad_version = bandit.plugins.insecure_ssl_tls:ssl_with_bad_version
ssl_with_bad_defaults = bandit.plugins.insecure_ssl_tls:ssl_with_bad_defaults
ssl_with_no_version = bandit.plugins.insecure_ssl_tls:ssl_with_no_version
# bandit/plugins/jinja2_templates.py
jinja2_autoescape_false = bandit.plugins.jinja2_templates:jinja2_autoescape_false
# bandit/plugins/mako_templates.py
use_of_mako_templates = bandit.plugins.mako_templates:use_of_mako_templates
# bandit/plugins/django_xss.py
django_mark_safe = bandit.plugins.django_xss:django_mark_safe
# bandit/plugins/try_except_continue.py
try_except_continue = bandit.plugins.try_except_continue:try_except_continue
# bandit/plugins/try_except_pass.py
try_except_pass = bandit.plugins.try_except_pass:try_except_pass
# bandit/plugins/weak_cryptographic_key.py
weak_cryptographic_key = bandit.plugins.weak_cryptographic_key:weak_cryptographic_key
# bandit/plugins/yaml_load.py
yaml_load = bandit.plugins.yaml_load:yaml_load
[build_sphinx]
all_files = 1
build-dir = doc/build
source-dir = doc/source
[pbr]
autodoc_tree_index_modules = True
autodoc_tree_excludes =
examples*
[bdist_wheel]
universal = 1