Skip to main content

A small example package for pythonsca

Project description

PyRaider

Using PyRaider You can scan installed dependencies known security vulnerabilities. It uses publicly known exploits, vulnerabilities database.

Usage

Documentation

Install pyraider using pip

pip install pyraider

Once a pyraider you can run help command. It will show you the list commands and examples.

pyraider -h

You can use pyraider -v to check the version.

pyraider -v

Scan Vulnerabilities against the dependencies

Using PyRaider you can scan the vulnerable packages.

To run basic scan you can use pyraider go command. It will automatically detects the installed packages and scans against it and shows the report.

pyraider go

If you want to scan you packages against requirements.txt or Pipfile.lock file.

pyraider check -f /Users/raider/project/requirements.txt
pyraider check -f /Users/raider/project/Pipfile.lock

If you want to scan the packages in the same directory.

pyraider check -f .

Reports

PyRaider currently supports JSON and CSV formats.

To Export as a JSON file.

pyraider check -f /Users/raider/project/requirments.txt -e json result.json
pyraider check -f /Users/raider/project/Pipfile.lock -e json result.json

To Export as a CSV file.

pyraider check -f /Users/raider/project/requirments.txt -e csv result.csv
pyraider check -f /Users/raider/project/Pipfile.lock -e csv result.csv

Out of Date Pacakges

Using PyRaider you can check the latest packages. Aginst installed packages.

pyraider validate -f /Users/raider/project/requirments.txt
pyraider validate -f /Users/raider/project/Pipfile.lock
  • It will check out of dated packages on the actiavted virtual environment.
pyraider validate 

Auto Fix

PyRaider also supports auto fix feature. Using this you can fix the vulnerable packages.

Note: To updating the packages might affect your application.

Fix

You can fix packages vulnerabilities individually. Once it is installed it will automatically update the requirments.txt or Pipfile.lock file.

pyraider fix

Autofix

You can also fix packages vulnerabilities at one shot. Once it is installed it will automatically update the requirments.txt or Pipfile.lock file.

pyraider autofix

Docker container

You can also run pyraider has a docker container.

Build docker container image

docker build -t pyraider .

Contribute

  • We welcome contributions to this project in the form of:
    • Feature Requests, Suggestions
    • Bugs
    • Help with writing tests
    • Add-on features, plugins, etc
    • Documentation

Contact us:

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

pyraider-0.4.2.tar.gz (7.7 kB view details)

Uploaded Source

Built Distribution

pyraider-0.4.2-py3-none-any.whl (8.4 kB view details)

Uploaded Python 3

File details

Details for the file pyraider-0.4.2.tar.gz.

File metadata

  • Download URL: pyraider-0.4.2.tar.gz
  • Upload date:
  • Size: 7.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.22.0 setuptools/42.0.2 requests-toolbelt/0.9.1 tqdm/4.41.0 CPython/3.7.2

File hashes

Hashes for pyraider-0.4.2.tar.gz
Algorithm Hash digest
SHA256 af012fe22a42f8fb9134ad7383173d6cc2ff10419b385011dd52b17b9bf0e5f4
MD5 8eda3ed75bfffe6c7d0ad75cdf3abebd
BLAKE2b-256 91bfc5b8ce6006fc13f79105ce3fea2d84cd43f3db413346207151d1af4211ff

See more details on using hashes here.

File details

Details for the file pyraider-0.4.2-py3-none-any.whl.

File metadata

  • Download URL: pyraider-0.4.2-py3-none-any.whl
  • Upload date:
  • Size: 8.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.22.0 setuptools/42.0.2 requests-toolbelt/0.9.1 tqdm/4.41.0 CPython/3.7.2

File hashes

Hashes for pyraider-0.4.2-py3-none-any.whl
Algorithm Hash digest
SHA256 3c51c49597622b554b62e5460a8c03e097f49a58a9fdf13c429b1265ac2fcb6a
MD5 b18fb908a7e0c55af1018d13492770c0
BLAKE2b-256 64c1e9fc742a0e78df741800578f57e2074b533ce661ea32ccfbb255906e8d70

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page