No project description provided
Project description
REPELSEC
About the tool
A command-line tool allowing developers to find security vulnerabilities within a Java project. This is done through:
- A series of static analysis (SAST) tests that can be run against any first party code (.java, .jsp) to identify potential CWE vulnerabilities.
- Software composition analysis (SCA) that identifies any outdated dependencies within the pom.xml file and their associated CVE vulnerabilities.
Installation
Pre-requisites - Python/PIP installed and added to PATH. Python 3.12 installed through the Microsoft Store is recommended.
To install REPELSEC, follow the below instructions.
- Run
python -m pip install repelsec/pip install repelsecwithin your preferred terminal. - Note the path repelsec.exe was installed to. For example, C: \Users\Jonah\AppData\Local\Packages\PythonSoftwareFoundation.Python.3.12_qbz5n2kfra8p0\LocalCache\local-packages\Python312\Scripts_
- Within Windows Search open "Edit the system environment variables"
- Press "Environment Variables"
- Under "System Variables", select "Path", and click "Edit"
- Select an empty slot within the Path variable and paste in the path repelsec.exe was installed to.
To keep this tool up to date, run the following command on a scheduled basis.
python -m pip install repelsec --upgrade / pip install repelsec --upgrade
PyPi Package - https://pypi.org/project/repelsec
Usage
Open a terminal within your IDE and enter the following command.
repelsec [parameters] path/filename
Available parameters include:
-c / --csv- Export results to a CSV file-p / --pdf- Export results to a PDF Report-t / --txt- Export results to a TXT file-b / --blank- Hide results from printing to the terminal. Prevents shouldersurfing.-e / --password <password>- PDF Reports can be encrypted/password-protected with this option.-o / --output_path <path>- Specify path to output results to.
This information can also be viewed locally using the following command.
repelsec --help
Examples
repelsec -c vulnerable.java
repelsec -p -e StrongPassword123?! -o ~/Documents/Results pom.xml
CWE Tests
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
- CWE-111: Direct Use of Unsafe JNI
- CWE-209: Generation of Error Message Containing Sensitive Information
- CWE-246: J2EE Bad Practices: Direct Use of Sockets
- CWE-259: Use of Hard-coded Password
- CWE-321: Use of Hard-coded Cryptographic Key
- CWE-326: Inadequate Encryption Strength
- CWE-382: J2EE Bad Practices: Use of System.exit()
- CWE-395: Use of NullPointerException Catch to Detect NULL Pointer Dereference
- CWE-396: Declaration of Catch for Generic Exception
- CWE-397: Declaration of Throws for Generic Exception
- CWE-481: Assigning instead of Comparing
- CWE-491: Public cloneable() Method Without Final ('Object Hijack')
- CWE-493: Critical Public Variable Without Final Modifier
- CWE-500: Public Static Field Not Marked Final
- CWE-572: Call to Thread run() instead of start()
- CWE-582: Array Declared Public, Final, and Static
- CWE-583: finalize() Method Declared Public
- CWE-585: Empty Synchronized Block
- CWE-586: Explicit Call to Finalize()
- CWE-595: Comparison of Object References Instead of Object Contents
- CWE-766: Critical Data Element Declared Public
- CWE-798: Use of Hard-coded Credentials
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file repelsec-0.6.tar.gz.
File metadata
- Download URL: repelsec-0.6.tar.gz
- Upload date:
- Size: 18.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.12.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
4d4303710347871d23cfd85cd2d0deff08f560a8adcd1d0fe63b52e34b2728e2
|
|
| MD5 |
3a07e1b0587a1a18c905046f8e090d8c
|
|
| BLAKE2b-256 |
6524f0330a04bf6584f161a2f378f7be043ffa29ed6ac6975491cdd4fe8c3f9d
|
File details
Details for the file repelsec-0.6-py3-none-any.whl.
File metadata
- Download URL: repelsec-0.6-py3-none-any.whl
- Upload date:
- Size: 21.1 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/5.0.0 CPython/3.12.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
23aea9848346eddd06f71bf6429ef90e70fffa21b365065f99b21a25b99896b9
|
|
| MD5 |
ab0b864eea99b1e7eb67dc02b48a016e
|
|
| BLAKE2b-256 |
b2e0ce81f2ca4e05fb71c4a59b0afae04e6e14e7a042600270fd862ac6b0ef2d
|