A lightweight CLI tool to audit Unity projects for risky code and binaries.
Project description
Usentinel
Usentinel is a lightweight, read-only command-line interface (CLI) tool designed to audit Unity projects for potentially hazardous code and native binaries. It provides static checks that highlight code patterns worth deeper inspection.
Key Features
- Static Code Analysis: Scans C# scripts for common security vulnerabilities and anti-patterns.
- Binary Detection: Identifies native binary files (e.g.,
.dll,.so,.dylib) which can sometimes pose a risk. - Clear Summary Output: Presents findings with severity and file locations so you can investigate quickly.
- Minimal Footprint: Usentinel is read-only and has minimal runtime dependencies.
Installation & Usage
Install from PyPI:
pip install usentinel
Then scan your Unity project:
usentinel /path/to/unity/project
Prefer working from source?
git clone https://github.com/TLI-1994/Usentinel.git
cd Usentinel
PYTHONPATH=src python -m usentinel.main /path/to/unity/project
Common flags:
--format {text|json}(default:text) – choose human-readable or machine-readable output.--no-colors(default: off) – disable ANSI colours in text mode.--ruleset path/to/extra_rules.yaml– load additional Semgrep-style YAML rules (repeatable).--include-binaries/--skip-binaries(default: include) – control native binary detection.--verbosity {quiet|normal|debug}(default:normal) – adjust the amount of detail (--quiet/--debugaliases).--engine {auto|heuristic|semgrep}(default:auto) – auto-select, force the heuristic engine, or use Semgrep.--progress/--no-progress(default: progress on) – toggle the live progress indicator.--pretty/--no-pretty(default: grouped off) – group findings by file and rule for easier human review.--version– print the installed Usentinel version and exit.
Semgrep snippets: When the Semgrep engine runs,
--verbosity debugdisplays code snippets. For community rules, Semgrep returns snippets only if you runsemgrep login; otherwise the placeholderrequires loginappears. Findings still include file paths and line numbers so you can review the code manually.
Each run reports which analysis engine was used (semgrep when available, otherwise a heuristic fallback) so you can confirm coverage.
Example:
usentinel ~/Projects/MyUnityGame --format json --skip-binaries
Run the test suite (optional)
pip install usentinel[test]
python -m pytest
License
MIT License — see LICENSE for details.
Developer Notes
Semgrep rules live under rules/core/semgrep, one YAML file per rule. Generated rules (such as unity.autorun.editor-hooks) are driven by the data in tools/semgrep/data and a companion script under tools/semgrep. Re-run the generator after editing the spec:
python -m venv venv
source venv/bin/activate
python tools/semgrep/generate_autorun_editor_hooks.py
Commit the spec, generator, and regenerated YAML together so the rule bundle stays reproducible.
Disclaimer
In addition to the MIT License notice, please keep the following in mind:
- Best-effort analysis: Usentinel is a read-only static-analysis aid. It highlights patterns worth human review but it is not a substitute for a professional security audit, and it cannot detect every risky construct in the Unity ecosystem.
- Your responsibility: You remain solely responsible for validating findings, performing additional due diligence, and complying with all applicable laws and regulations.
- No warranties: The tool is provided “AS IS” without express or implied warranties, including but not limited to implied warranties of merchantability, fitness for a particular purpose, non-infringement, security, or error-free operation.
- No liability: In no event shall the authors or contributors be liable for any direct, indirect, incidental, special, exemplary, or consequential damages arising out of or in connection with the use of Usentinel or reliance on its results. By using Usentinel you acknowledge these limitations and agree to hold the authors and contributors harmless.
Feedback and contributions are welcome. If you spot gaps in rule coverage or encounter issues, please open an issue or pull request on GitHub so we can improve together.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file usentinel-0.2.0.tar.gz.
File metadata
- Download URL: usentinel-0.2.0.tar.gz
- Upload date:
- Size: 27.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
afafd9cccc6b8732cafe88770881e7b6a7b892f4205c0d67ea277e8af827e8f9
|
|
| MD5 |
5c8749004d4aa4bdff8d59663d1ad0ec
|
|
| BLAKE2b-256 |
1e9895af3abc180f36093b5b9b61f7945d5ba09e946cf3d41c557bce33f7fc4b
|
File details
Details for the file usentinel-0.2.0-py3-none-any.whl.
File metadata
- Download URL: usentinel-0.2.0-py3-none-any.whl
- Upload date:
- Size: 25.4 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/6.2.0 CPython/3.13.2
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
3c1f143079ee3b0737912f5ae82af1687a803e1c8c5053d948c27980e2f9a0bb
|
|
| MD5 |
f0dd471ced3c0d62ab54945f09e85801
|
|
| BLAKE2b-256 |
12fa4c0d126b70965149591136d0f5f45895b8fdcf31da64f32745738058e3c7
|