Closed lfatty closed 10 years ago
Thanks @marcesher
I have created a .txt under patterns directory. So basically running for example
$ bin/clouseau_thin -u https://github.com/karan/Projects --patterns ~/clouseau/clouseau-master/clouseau/patterns/dangerous-api.txt --revlist all
will reveal any existing suspicious function call or API.
Thanks @lfatty. I'm going to pull this in, and then we'll pull it into a separate file and turn these into appropriate regexes to, for example, look for things that look like function calls, etc.