diff --git a/README.md b/README.md index e5cbd90..64d2539 100644 --- a/README.md +++ b/README.md @@ -28,14 +28,14 @@ $ poetry shell ~~~bash $ pipx install git-vuln-finder -$ finder --help +$ git-vuln-finder --help ~~~ # Usage ~~~bash -usage: finder.py [-h] [-v] [-r R] [-o O] [-s S] [-p P] [-c] [-t] +usage: git-vuln-finder [-h] [-v] [-r R] [-o O] [-s S] [-p P] [-c] [-t] Finding potential software vulnerabilities from git commit messages. @@ -66,7 +66,7 @@ git-vuln-finder comes with 3 default patterns which can be selected to find the ## A sample partial output from Curl git repository ~~~bash -python3 finder.py -r /home/adulau/git/curl | jq . +$ git-vuln-finder -r /home/adulau/git/curl | jq . ... "6df916d751e72fc9a1febc07bb59c4ddd886c043": { "message": "loadlibrary: Only load system DLLs from the system directory\n\nInspiration provided by: Daniel Stenberg and Ray Satiro\n\nBug: https://curl.haxx.se/docs/adv_20160530.html\n\nRef: Windows DLL hijacking with curl, CVE-2016-4802\n", diff --git a/pyproject.toml b/pyproject.toml index d68b00e..95f779a 100644 --- a/pyproject.toml +++ b/pyproject.toml @@ -42,7 +42,7 @@ include = [ ] [tool.poetry.scripts] -finder = "bin.finder:main" +git-vuln-finder = "bin.finder:main" [tool.poetry.dependencies] python = "^3.6"