Skip to main content

A lightweight CLI tool to audit Unity projects for risky code and binaries.

Project description

Usentinel

PyPI

Usentinel is a lightweight, read-only command-line interface (CLI) tool designed to audit Unity projects for potentially hazardous code and native binaries. It provides static checks that highlight code patterns worth deeper inspection.

Key Features

  • Static Code Analysis: Scans C# scripts for common security vulnerabilities and anti-patterns.
  • Binary Detection: Identifies native binary files (e.g., .dll, .so, .dylib) which can sometimes pose a risk.
  • Clear Summary Output: Presents findings with severity and file locations so you can investigate quickly.
  • Minimal Footprint: Usentinel is read-only and has minimal runtime dependencies.

Installation & Usage

Install from PyPI:

pip install usentinel

Then scan your Unity project:

usentinel /path/to/unity/project

Prefer working from source?

git clone https://github.com/TLI-1994/Usentinel.git
cd Usentinel
PYTHONPATH=src python -m usentinel.main /path/to/unity/project

Common flags:

  • --format {text|json} (default: text) – choose human-readable or machine-readable output.
  • --no-colors (default: off) – disable ANSI colours in text mode.
  • --ruleset path/to/extra_rules.yaml – load additional Semgrep-style YAML rules (repeatable).
  • --include-binaries / --skip-binaries (default: include) – control native binary detection.
  • --verbosity {quiet|normal|debug} (default: normal) – adjust the amount of detail (--quiet / --debug aliases).
  • --engine {auto|heuristic|semgrep} (default: auto) – auto-select, force the heuristic engine, or use Semgrep.
  • --progress / --no-progress (default: progress on) – toggle the live progress indicator.
  • --pretty / --no-pretty (default: grouped off) – group findings by file and rule for easier human review.
  • --version – print the installed Usentinel version and exit.

Semgrep snippets: When the Semgrep engine runs, --verbosity debug displays code snippets. For community rules, Semgrep returns snippets only if you run semgrep login; otherwise the placeholder requires login appears. Findings still include file paths and line numbers so you can review the code manually.

Each run reports which analysis engine was used (semgrep when available, otherwise a heuristic fallback) so you can confirm coverage.

Example:

usentinel ~/Projects/MyUnityGame --format json --skip-binaries

Run the test suite (optional)

pip install usentinel[test]
python -m pytest

License

MIT License — see LICENSE for details.


Developer Notes

Semgrep rules live under rules/core/semgrep, one YAML file per rule. Generated rules (such as unity.autorun.editor-hooks) are driven by the data in tools/semgrep/data and a companion script under tools/semgrep. Re-run the generator after editing the spec:

python -m venv venv
source venv/bin/activate
python tools/semgrep/generate_autorun_editor_hooks.py

Commit the spec, generator, and regenerated YAML together so the rule bundle stays reproducible.


Disclaimer

In addition to the MIT License notice, please keep the following in mind:

  • Best-effort analysis: Usentinel is a read-only static-analysis aid. It highlights patterns worth human review but it is not a substitute for a professional security audit, and it cannot detect every risky construct in the Unity ecosystem.
  • Your responsibility: You remain solely responsible for validating findings, performing additional due diligence, and complying with all applicable laws and regulations.
  • No warranties: The tool is provided “AS IS” without express or implied warranties, including but not limited to implied warranties of merchantability, fitness for a particular purpose, non-infringement, security, or error-free operation.
  • No liability: In no event shall the authors or contributors be liable for any direct, indirect, incidental, special, exemplary, or consequential damages arising out of or in connection with the use of Usentinel or reliance on its results. By using Usentinel you acknowledge these limitations and agree to hold the authors and contributors harmless.

Feedback and contributions are welcome. If you spot gaps in rule coverage or encounter issues, please open an issue or pull request on GitHub so we can improve together.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

usentinel-0.2.0.tar.gz (27.3 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

usentinel-0.2.0-py3-none-any.whl (25.4 kB view details)

Uploaded Python 3

File details

Details for the file usentinel-0.2.0.tar.gz.

File metadata

  • Download URL: usentinel-0.2.0.tar.gz
  • Upload date:
  • Size: 27.3 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.2

File hashes

Hashes for usentinel-0.2.0.tar.gz
Algorithm Hash digest
SHA256 afafd9cccc6b8732cafe88770881e7b6a7b892f4205c0d67ea277e8af827e8f9
MD5 5c8749004d4aa4bdff8d59663d1ad0ec
BLAKE2b-256 1e9895af3abc180f36093b5b9b61f7945d5ba09e946cf3d41c557bce33f7fc4b

See more details on using hashes here.

File details

Details for the file usentinel-0.2.0-py3-none-any.whl.

File metadata

  • Download URL: usentinel-0.2.0-py3-none-any.whl
  • Upload date:
  • Size: 25.4 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.2

File hashes

Hashes for usentinel-0.2.0-py3-none-any.whl
Algorithm Hash digest
SHA256 3c1f143079ee3b0737912f5ae82af1687a803e1c8c5053d948c27980e2f9a0bb
MD5 f0dd471ced3c0d62ab54945f09e85801
BLAKE2b-256 12fa4c0d126b70965149591136d0f5f45895b8fdcf31da64f32745738058e3c7

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page