Unverified Commit 55a7097c by Enkelmann Committed by GitHub

V0.3 (#44)

prepare v0.3 release
parent b150586b
......@@ -8,7 +8,7 @@ services:
install:
- sudo apt-get update
- pip install scons
- docker
- docker
before_script:
- ./.travis_prepare.sh
......@@ -18,4 +18,4 @@ script:
notifications:
email:
- firmware-security@fkie.fraunhofer.de
- nils-edvin.enkelmann@fkie.fraunhofer.de
dev
0.3 (2019-12)
====
- Added more documentation to checks (PR #26)
......@@ -8,8 +8,9 @@ dev
- Added file output support via --out (PR #30)
- Surpress logging of info, error and warning to STDOUT via --no-logging (PR #32)
- Added check-path feature via --check-path that searches paths between interesting input functions and cwe hits (PR #31)
- Added online documentation (PR #36, #37)
- Added convenience executable to enable shorter command line options (PR #40)
- Added a plugin for integration into Ghidra (PR #42)
- Added a plugin for integration into Ghidra (PR #42, #43)
0.2 (2019-06-25)
=====
......
FROM fkiecad/cwe_checker_travis_docker_image:latest
FROM fkiecad/cwe_checker_travis_docker_image:stable
COPY . /home/bap/cwe_checker/
......
......@@ -6,6 +6,7 @@
[![Codacy Badge](https://api.codacy.com/project/badge/Grade/9dbf158110de427d893b40ba397b94bc)](https://www.codacy.com/app/weidenba/cwe_checker?utm_source=github.com&utm_medium=referral&utm_content=fkie-cad/cwe_checker&utm_campaign=Badge_Grade)
[![Build Status](https://travis-ci.org/fkie-cad/cwe_checker.svg?branch=master)](https://travis-ci.org/fkie-cad/cwe_checker)
![Docker-Pulls](https://img.shields.io/docker/pulls/fkiecad/cwe_checker.svg)
[![Documentation](https://img.shields.io/badge/doc-stable-green.svg)](https://fkie-cad.github.io/cwe_checker/doc/html/cwe_checker/index.html)
## What is cwe_checker? ##
*cwe_checker* is a suite of tools to detect common bug classes such as use of dangerous functions and simple integer overflows. These bug classes are formally known as [Common Weakness Enumerations](https://cwe.mitre.org/) (CWEs). Its main goal is to aid analysts to quickly find vulnerable code paths.
......
opam-version: "2.0"
name: "cwe_checker"
version: "0.2"
version: "0.3"
synopsis: "BAP plugin collection to detect common bug classes"
description: """
cwe_checker is a suite of tools to detect common bug classes such as use of dangerous functions and simple integer overflows. These bug classes are formally known as Common Weakness Enumerations (CWEs).
......@@ -15,15 +15,19 @@ depends: [
"ocaml" {>= "4.05"}
"dune" {>= "1.6"}
"yojson" {>= "1.6.0"}
"bap" {>= "1.6"}
"bap" {>= "1.6" & < "2.0"}
"alcotest" {>= "0.8.3"}
"core_kernel" {>= "v0.11" & < "v0.12"}
"ppx_jane" {>= "v0.11" & < "v0.12"}
"ppx_deriving_yojson" {>= "3.5.1"}
"odoc" {>= "1.4"}
]
depexts: [
"binutils"
]
conflicts: [
"fkie-cad-cwe-checker" {!= "0.2"}
]
build: [
[ "dune" "build" "--profile" "release" ]
]
......@@ -32,7 +36,3 @@ install: [
[ make "clean" ]
[ make "all" ]
]
remove: [
[ make "uninstall" ]
[ make "clean" ]
]
opam-version: "2.0"
name: "cwe_checker_core"
version: "0.2"
version: "0.3"
synopsis: "Core library for the cwe_checker package"
description: """
Core library for the cwe_checker suite of tools.
......@@ -15,20 +15,21 @@ depends: [
"ocaml" {>= "4.05"}
"dune" {>= "1.6"}
"yojson" {>= "1.6.0"}
"bap" {>= "1.6"}
"bap" {>= "1.6" & < "2.0"}
"core_kernel" {>= "v0.11" & < "v0.12"}
"ppx_jane" {>= "v0.11" & < "v0.12"}
"ppx_deriving_yojson" {>= "3.5.1"}
"odoc" {>= "1.4"}
]
depexts: [
"binutils"
]
conflicts: [
"fkie-cad-cwe-checker" {!= "0.2"}
]
build: [
[ "dune" "build" "--profile" "release" ]
]
install: [
[ "dune" "install" ]
]
remove: [
[ "dune" "uninstall" ]
]
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment