bandit
Bandit is a tool designed to find common security issues in Python code. To do this Bandit processes each file, builds an AST from it, and runs appropriate plugins against the AST nodes. Once Bandit has finished scanning all the files it generates a report.Bandit was originally developed within the OpenStack Security Project and later rehomed to PyCQA.
Details
Category: Static Code Analysis
Publisher: trickest
Created Date: 6/23/2021
Container: quay.io/trickest/bandit:1.7.1
Source URL: https://github.com/PyCQA/bandit
Parameters
Command:
-d
- Turn on debug modeCommand:
-q
- Only show output in the case of an errorCommand:
--profile
- Profile to use (defaults to executing all tests)Command:
--skip
- Comma-separated list of test IDs to skipCommand:
--tests
- Comma-separated list of test IDs to runCommand:
--verbose
- Output extra information like excluded and included filesCommand:
--baseline
- Path of a baseline report to compare against (only JSON-formatted files are accepted)Command:
--ini
- Path to a .bandit file that supplies command line argumentsCommand:
--aggregate
- Aggregate ggregate output by vulnerability (default) or by filenameCommand:
--exit-zero
- Exit with 0, even with results foundCommand:
-l
- Report only issues of a given severity level or higher (level for LOW, -ll for MEDIUM, -lll for HIGH)Command:
--confidence
- Report only issues of a given confidence level or higherCommand:
-lll
- Report only issues of a given severity level or higher (level for LOW, -ll for MEDIUM, -lll for HIGH)Command:
--configfile
- Optional config file to use for selecting plugins and overriding defaultsCommand:
--ignore-nosec
- Do not skip lines with # nosec commentsCommand:
-ll
- Report only issues of a given severity level or higher (level for LOW, -ll for MEDIUM, -lll for HIGH)Command:
--msg-template
- Specify output message template (only usable with output-format is set to custom)Command:
--number
- Maximum number of code lines to output for each issueCommand:
targets
- Source file(s)Command:
--exclude
- Comma-separated list of paths (glob patterns supported) to exclude from scan (note that these are in addition to the excluded paths provided in the config file) (default: .svn,CVS,.bzr,.hg,.git,__pycache__,.tox,.eggs,*.egg)Command:
-f
- {csv,custom,html,json,screen,txt,xml,yaml}Command:
targets
- Source folderCommand:
--recursive
- Find and process files in subdirectories