Easily find potential security flaws in source code
Graudit supports scanning code written in several languages; asp, jsp, perl, php and python.
Graudit supports several options and tries to follow good shell practices. For
a list of the options you can run graudit -h or see below. The simplest way to use
The following options are available:
-h prints a short help text
-v prints version number
-d < db > database to use
-c < num > number of lines of context to display, default is 2
-z supress colors
Graudit uses extended regular expressions (POSIX) as it's signatures and comes with several databases ready for use. You can extend the existing databases or make your own if you require additional signatures.
* Default is aimed at finding low hanging fruit. It cointains generic rules that should match common vulnerabilites in several languages. However, in order to find additional vulnerabilities for a specific language you should use the
language specific databases.
If you would like to contribute to graudit, please fork the repository at github
and use that.
In a hurry? Add it to your Download Basket!
What's New in This Release:
- This version fixes the PHP (php/xss.db) database, which had a blank line at the end, causing everything to match.
- It adds a test case for blank lines in signature scripts.
- It adds a database validating aux script.
- It updates the Makefile file manifest.