ucsb-seclab / karonte

Karonte is a static analysis tool to detect multi-binary vulnerabilities in embedded firmware
BSD 2-Clause "Simplified" License
384 stars 61 forks source link

source: not found #3

Closed phros closed 4 years ago

phros commented 4 years ago

Hi there,

thanks for making this project publicly available!

When using the run_karonte.sh in the home directory, it uses /bin/sh which does not have a source command. Changing the shebang to /bin/bash fixed the issue. Is there a reason for using /bin/sh that I'm missing here!

Cheers

badnack commented 4 years ago

Hi, there is no particular reason to use sh, we can definitely use bash. I will fix it.

On Fri, 7 Feb 2020 at 02:35, phros notifications@github.com wrote:

Hi there,

thanks for making this project publicly available!

When using the run_karonte.sh in the home directory, it uses /bin/sh which does not have a source command. Changing the shebang to /bin/bash fixed the issue. Is there a reason for using /bin/sh that I'm missing here!

Cheers

— You are receiving this because you are subscribed to this thread. Reply to this email directly, view it on GitHub https://github.com/ucsb-seclab/karonte/issues/3?email_source=notifications&email_token=AAH5GZFFU72NXRL22HIULB3RBU2QFA5CNFSM4KRMHQY2YY3PNVWWK3TUL52HS4DFUVEXG43VMWVGG33NNVSW45C7NFSM4ILYU5EA, or unsubscribe https://github.com/notifications/unsubscribe-auth/AAH5GZHTGBAXFG4QJSQ3BZTRBU2QFANCNFSM4KRMHQYQ .

-- Nilo Redini

Site: www.badnack.it Twitter: badnack Skype: badnack PGP key: http://www.badnack.it/Keys/PbKey