Renamed command line.

This commit is contained in:
Cédric Bonhomme 2020-01-03 17:35:04 +01:00
parent 0b31bc36b2
commit dfa15c119d
No known key found for this signature in database
GPG key ID: A1CB94DE57B7A70D
2 changed files with 4 additions and 4 deletions

View file

@ -28,14 +28,14 @@ $ poetry shell
~~~bash
$ pipx install git-vuln-finder
$ finder --help
$ git-vuln-finder --help
~~~
# Usage
~~~bash
usage: finder.py [-h] [-v] [-r R] [-o O] [-s S] [-p P] [-c] [-t]
usage: git-vuln-finder [-h] [-v] [-r R] [-o O] [-s S] [-p P] [-c] [-t]
Finding potential software vulnerabilities from git commit messages.
@ -66,7 +66,7 @@ git-vuln-finder comes with 3 default patterns which can be selected to find the
## A sample partial output from Curl git repository
~~~bash
python3 finder.py -r /home/adulau/git/curl | jq .
$ git-vuln-finder -r /home/adulau/git/curl | jq .
...
"6df916d751e72fc9a1febc07bb59c4ddd886c043": {
"message": "loadlibrary: Only load system DLLs from the system directory\n\nInspiration provided by: Daniel Stenberg and Ray Satiro\n\nBug: https://curl.haxx.se/docs/adv_20160530.html\n\nRef: Windows DLL hijacking with curl, CVE-2016-4802\n",

View file

@ -42,7 +42,7 @@ include = [
]
[tool.poetry.scripts]
finder = "bin.finder:main"
git-vuln-finder = "bin.finder:main"
[tool.poetry.dependencies]
python = "^3.6"