forked from PyCQA/bandit
-
Notifications
You must be signed in to change notification settings - Fork 0
/
setup.cfg
126 lines (101 loc) · 5.26 KB
/
setup.cfg
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
[metadata]
name = bandit
summary = Security oriented static analyser for python code.
description-file =
README.rst
author = OpenStack Security Group
author-email = [email protected]
home-page = https://wiki.openstack.org/wiki/Security/Projects/Bandit
classifier =
Environment :: OpenStack
Intended Audience :: Information Technology
Intended Audience :: System Administrators
Intended Audience :: Developers
License :: OSI Approved :: Apache Software License
Operating System :: POSIX :: Linux
Operating System :: MacOS :: MacOS X
Programming Language :: Python
Programming Language :: Python :: 2
Programming Language :: Python :: 2.7
Programming Language :: Python :: 3
Programming Language :: Python :: 3.5
Topic :: Security
[entry_points]
console_scripts =
bandit = bandit.cli.main:main
bandit-config-generator = bandit.cli.config_generator:main
bandit-baseline = bandit.cli.baseline:main
bandit.blacklists =
calls = bandit.blacklists.calls:gen_blacklist
imports = bandit.blacklists.imports:gen_blacklist
bandit.formatters =
csv = bandit.formatters.csv:report
json = bandit.formatters.json:report
txt = bandit.formatters.text:report
xml = bandit.formatters.xml:report
html = bandit.formatters.html:report
screen = bandit.formatters.screen:report
yaml = bandit.formatters.yaml:report
custom = bandit.formatters.custom:report
bandit.plugins =
# bandit/plugins/app_debug.py
flask_debug_true = bandit.plugins.app_debug:flask_debug_true
# bandit/plugins/asserts.py
assert_used = bandit.plugins.asserts:assert_used
# bandit/plugins/crypto_request_no_cert_validation.py
request_with_no_cert_validation = bandit.plugins.crypto_request_no_cert_validation:request_with_no_cert_validation
# bandit/plugins/exec_as_root.py
execute_with_run_as_root_equals_true = bandit.plugins.exec_as_root:execute_with_run_as_root_equals_true
# bandit/plugins/exec.py
exec_used = bandit.plugins.exec:exec_used
# bandit/plugins/general_bad_File_permissions.py
set_bad_file_permissions = bandit.plugins.general_bad_file_permissions:set_bad_file_permissions
# bandit/plugins/general_bind_all_interfaces.py
hardcoded_bind_all_interfaces = bandit.plugins.general_bind_all_interfaces:hardcoded_bind_all_interfaces
# bandit/plugins/general_hardcoded_password.py
hardcoded_password_string = bandit.plugins.general_hardcoded_password:hardcoded_password_string
hardcoded_password_funcarg = bandit.plugins.general_hardcoded_password:hardcoded_password_funcarg
hardcoded_password_default = bandit.plugins.general_hardcoded_password:hardcoded_password_default
# bandit/plugins/general_hardcoded_tmp.py
hardcoded_tmp_directory = bandit.plugins.general_hardcoded_tmp:hardcoded_tmp_directory
# bandit/plugins/injection_paramiko.py
paramiko_calls = bandit.plugins.injection_paramiko:paramiko_calls
# bandit/plugins/injection_shell.py
subprocess_popen_with_shell_equals_true = bandit.plugins.injection_shell:subprocess_popen_with_shell_equals_true
subprocess_without_shell_equals_true = bandit.plugins.injection_shell:subprocess_without_shell_equals_true
any_other_function_with_shell_equals_true = bandit.plugins.injection_shell:any_other_function_with_shell_equals_true
start_process_with_a_shell = bandit.plugins.injection_shell:start_process_with_a_shell
start_process_with_no_shell = bandit.plugins.injection_shell:start_process_with_no_shell
start_process_with_partial_path = bandit.plugins.injection_shell:start_process_with_partial_path
# bandit/plugins/injection_sql.py
hardcoded_sql_expressions = bandit.plugins.injection_sql:hardcoded_sql_expressions
# bandit/plugins/hashlib_new_insecure_functions.py
hashlib_new_insecure_functions = bandit.plugins.hashlib_new_insecure_functions:hashlib_new
# bandit/plugins/injection_wildcard.py
linux_commands_wildcard_injection = bandit.plugins.injection_wildcard:linux_commands_wildcard_injection
# bandit/plugins/insecure_ssl_tls.py
ssl_with_bad_version = bandit.plugins.insecure_ssl_tls:ssl_with_bad_version
ssl_with_bad_defaults = bandit.plugins.insecure_ssl_tls:ssl_with_bad_defaults
ssl_with_no_version = bandit.plugins.insecure_ssl_tls:ssl_with_no_version
# bandit/plugins/jinja2_templates.py
jinja2_autoescape_false = bandit.plugins.jinja2_templates:jinja2_autoescape_false
# bandit/plugins/mako_templates.py
use_of_mako_templates = bandit.plugins.mako_templates:use_of_mako_templates
# bandit/plugins/secret_config_options.py
password_config_option_not_marked_secret = bandit.plugins.secret_config_option:password_config_option_not_marked_secret
# bandit/plugins/try_except_continue.py
try_except_continue = bandit.plugins.try_except_continue:try_except_continue
# bandit/plugins/try_except_pass.py
try_except_pass = bandit.plugins.try_except_pass:try_except_pass
# bandit/plugins/weak_cryptographic_key.py
weak_cryptographic_key = bandit.plugins.weak_cryptographic_key:weak_cryptographic_key
# bandit/plugins/yaml_load.py
yaml_load = bandit.plugins.yaml_load:yaml_load
[build_sphinx]
all_files = 1
build-dir = doc/build
source-dir = doc/source
[pbr]
autodoc_tree_index_modules = True
[bdist_wheel]
universal = 1