Skip to content

Anlayze source code for dangerous API calls and create report in csv format.

License

Notifications You must be signed in to change notification settings

doytsujin/scary-strings

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

53 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

😱 Scary Strings! 😱

Flag potentially dangerous API calls in source code, a.k.a. lines containing scary strings from a security perspective!

Use this tool as a first step during a security audit on your web application's source code!

Flagged lines of code are written to a CSV file so you can track your audit progress!

The list of potentially dangerous API calls comes primarily from the Web Application Hacker's Handbook.

The basic lists from this book have been modified and augmented by adding function calls and other scary strings that I've found in my experience as well as from blog posts.

Usage

Make sure pipenv is installed.

Example 1: Scanning a PHP project for all dangerous function calls

pipenv run ./scary-strings php wordlists/php/all /path/to/php/project

Example 2: Scan a Python project for object serialization functions

pipenv run ./scary-strings python wordlists/python/object_serialization /path/to/python/project

Example 3: Scanning a project for dangerous function calls and problematic code comments

pipenv run ./scary_strings.py python wordlists/python/all --scan-comments=True --comment-wordlist=wordlists/comments/derogatory /path/to/python/project

Languages Currently Supported

  • PHP
  • Python (limited wordlists)

About

Anlayze source code for dangerous API calls and create report in csv format.

Resources

License

Code of conduct

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%