Renamed command line.

This commit is contained in:
Cédric Bonhomme 2020-01-03 17:35:04 +01:00
parent 0b31bc36b2
commit dfa15c119d
No known key found for this signature in database
GPG key ID: A1CB94DE57B7A70D
2 changed files with 4 additions and 4 deletions

View file

@ -28,14 +28,14 @@ $ poetry shell
~~~bash ~~~bash
$ pipx install git-vuln-finder $ pipx install git-vuln-finder
$ finder --help $ git-vuln-finder --help
~~~ ~~~
# Usage # Usage
~~~bash ~~~bash
usage: finder.py [-h] [-v] [-r R] [-o O] [-s S] [-p P] [-c] [-t] usage: git-vuln-finder [-h] [-v] [-r R] [-o O] [-s S] [-p P] [-c] [-t]
Finding potential software vulnerabilities from git commit messages. Finding potential software vulnerabilities from git commit messages.
@ -66,7 +66,7 @@ git-vuln-finder comes with 3 default patterns which can be selected to find the
## A sample partial output from Curl git repository ## A sample partial output from Curl git repository
~~~bash ~~~bash
python3 finder.py -r /home/adulau/git/curl | jq . $ git-vuln-finder -r /home/adulau/git/curl | jq .
... ...
"6df916d751e72fc9a1febc07bb59c4ddd886c043": { "6df916d751e72fc9a1febc07bb59c4ddd886c043": {
"message": "loadlibrary: Only load system DLLs from the system directory\n\nInspiration provided by: Daniel Stenberg and Ray Satiro\n\nBug: https://curl.haxx.se/docs/adv_20160530.html\n\nRef: Windows DLL hijacking with curl, CVE-2016-4802\n", "message": "loadlibrary: Only load system DLLs from the system directory\n\nInspiration provided by: Daniel Stenberg and Ray Satiro\n\nBug: https://curl.haxx.se/docs/adv_20160530.html\n\nRef: Windows DLL hijacking with curl, CVE-2016-4802\n",

View file

@ -42,7 +42,7 @@ include = [
] ]
[tool.poetry.scripts] [tool.poetry.scripts]
finder = "bin.finder:main" git-vuln-finder = "bin.finder:main"
[tool.poetry.dependencies] [tool.poetry.dependencies]
python = "^3.6" python = "^3.6"