You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
--ignore-nosec do not skip lines with # nosec comments
93
97
-r, --recursive find and process files in subdirectories
94
98
-x EXCLUDED_PATHS, --exclude EXCLUDED_PATHS
95
99
Separate files with commas
96
100
101
+
97
102
print arguments:
98
103
-trim, --trim-reassigned-in
99
104
Trims the reassigned list to just the vulnerability
100
105
chain.
101
106
-i, --interactive Will ask you about each blackbox function call in
102
107
vulnerability chains.
103
108
109
+
Choosing a Web Framework
110
+
========================
111
+
112
+
`The -a option chooses what functions will have their arguments tainted`_
113
+
114
+
.. _The -a option chooses what functions will have their arguments tainted: https://github.com/python-security/pyt/tree/master/pyt/web_frameworks#web-frameworks
115
+
116
+
Configuring Source and Sink Information
117
+
=======================================
118
+
119
+
Use the ``-t`` option to specify sources and sinks, by default `this file is used`_.
120
+
121
+
.. _this file is used: https://github.com/python-security/pyt/blob/master/pyt/vulnerability_definitions/all_trigger_words.pyt
122
+
123
+
For functions that are imported from libraries, use the ``-m`` option to specify whether or not they
124
+
return tainted values given tainted inputs, by `default this file is used`_.
125
+
126
+
.. _default this file is used: https://github.com/python-security/pyt/blob/master/pyt/vulnerability_definitions/blackbox_mapping.json)
0 commit comments