Bandit plugin to scan for AWS keys
Project description
This is a Bandit plugin to scan for strings in your source code that look like AWS keys.
Usage
Bandit plugins are automatically activated once they are installed. To use this plugin, you simply need to install the plugin:
$ pip install bandit-aws
To verify the installation, display the bandit help text:
$ bandit --help
It will display a list of tests that were discovered and loaded. Verify that you see “C100 - hardcoded_aws_key” in the list.
You can then run bandit in the normal way. For example:
$ bandit -r myproject/
If any strings that look like AWS keys are found, they will be reported:
>> Issue: [C100:hardcoded_aws_key] Possible hardcoded AWS secret access key: 'JalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY' Severity: Medium Confidence: Medium Location: myproject/example.py:11 More Info: https://bandit.readthedocs.io/en/latest/plugins/c100_hardcoded_aws_key.html 10 AWS_ACCESS_KEY_ID = "AKIAIOSFODNN7EXAMPLE" 11 AWS_SECRET_ACCESS_KEY = "JalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY" 12 13 14 class MyClass:
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distributions
No source distribution files available for this release.See tutorial on generating distribution archives.
Built Distribution
File details
Details for the file bandit_aws-0.0.20190228090735-py3-none-any.whl
.
File metadata
- Download URL: bandit_aws-0.0.20190228090735-py3-none-any.whl
- Upload date:
- Size: 6.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/1.12.1 pkginfo/1.4.2 requests/2.20.1 setuptools/40.6.2 requests-toolbelt/0.8.0 tqdm/4.28.1 CPython/3.7.1
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 2fc9bdcb5c7db681e441ee1c7fd9e2d94862bc836f57e3093af9e05e76d78fde |
|
MD5 | de7235d62bae012adaf0ab9aa6cd4aeb |
|
BLAKE2b-256 | 8e1f7a91e2833c531fb889ce34fb967a59c99abf3a49bb7f8d570f7c29ac8c83 |