Skip to main content

No project description provided

Project description

REPELSEC

About the tool

A command-line tool allowing developers to find security vulnerabilities within a Java project. This is done through:

  • A series of static analysis (SAST) tests that can be run against any first party code (.java, .jsp) to identify potential CWE vulnerabilities.
  • Software composition analysis (SCA) that identifies any outdated dependencies within the pom.xml file and their associated CVE vulnerabilities.

Installation

If your system has Python installed, open your preferred terminal or IDE and enter the following command.

python -m pip install repelsec

pip install repelsec

To keep this tool up to date, run the following command on a scheduled basis.

pip install repelsec --upgrade

PyPi Package - https://pypi.org/project/repelsec

Usage

Open a terminal within your IDE and enter the following command.

repelsec [parameters] path/filename

Available parameters include:

  • -c / --csv - Export results to a CSV file
  • -p / --pdf - Export results to a PDF Report
  • -t / --txt - Export results to a TXT file
  • -b / --blank - Hide results from printing to the terminal. Prevents shouldersurfing.
  • -e / --password <password> - PDF Reports can be encrypted/password-protected with this option.
  • -o / --output_path <path> - Specify path to output results to.

This information can also be viewed locally using the following command.

repelsec --help

Examples

repelsec -c vulnerable.java

repelsec -p -e StrongPassword123?! -o ~/Documents/Results pom.xml

CWE Tests

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
  • CWE-111: Direct Use of Unsafe JNI
  • CWE-190: Integer Overflow or Wraparound
  • CWE-191: Integer Underflow (Wrap or Wraparound)
  • CWE-209: Generation of Error Message Containing Sensitive Information
  • CWE-246: J2EE Bad Practices: Direct Use of Sockets
  • CWE-259: Use of Hard-coded Password
  • CWE-321: Use of Hard-coded Cryptographic Key
  • CWE-326: Inadequate Encryption Strength
  • CWE-382: J2EE Bad Practices: Use of System.exit()
  • CWE-395: Use of NullPointerException Catch to Detect NULL Pointer Dereference
  • CWE-396: Declaration of Catch for Generic Exception
  • CWE-397: Declaration of Throws for Generic Exception
  • CWE-481: Assigning instead of Comparing
  • CWE-491: Public cloneable() Method Without Final ('Object Hijack')
  • CWE-493: Critical Public Variable Without Final Modifier
  • CWE-500: Public Static Field Not Marked Final
  • CWE-572: Call to Thread run() instead of start()
  • CWE-582: Array Declared Public, Final, and Static
  • CWE-583: finalize() Method Declared Public
  • CWE-585: Empty Synchronized Block
  • CWE-586: Explicit Call to Finalize()
  • CWE-595: Comparison of Object References Instead of Object Contents
  • CWE-766: Critical Data Element Declared Public
  • CWE-798: Use of Hard-coded Credentials

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

repelsec-0.4.tar.gz (17.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

repelsec-0.4-py3-none-any.whl (20.8 kB view details)

Uploaded Python 3

File details

Details for the file repelsec-0.4.tar.gz.

File metadata

  • Download URL: repelsec-0.4.tar.gz
  • Upload date:
  • Size: 17.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.0.0 CPython/3.12.2

File hashes

Hashes for repelsec-0.4.tar.gz
Algorithm Hash digest
SHA256 677e94b4d50b8299fb2359cca9a5c1a0c0093f714c6935cf1d36b565d06aa240
MD5 583f2965b25075db80983a383cddbbb0
BLAKE2b-256 637571b58baa6ddadeabe6fca29b4fad97446de03422da31fcd3dabc7fbed717

See more details on using hashes here.

File details

Details for the file repelsec-0.4-py3-none-any.whl.

File metadata

  • Download URL: repelsec-0.4-py3-none-any.whl
  • Upload date:
  • Size: 20.8 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.0.0 CPython/3.12.2

File hashes

Hashes for repelsec-0.4-py3-none-any.whl
Algorithm Hash digest
SHA256 b07c13c3c670d09bd1d6bfcd36d482b02f7d6ff5d529bf393c12bfd72a0355a5
MD5 923d27d975fb290938a4f3e87e937bda
BLAKE2b-256 8d0902986f4037f0b432cea3cda03047bf4e3fc906469fa03853712fa870b1f5

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page