Graudit v1.5 released

Graudit is a simple script and signature sets that allows you to find potential security flaws in source code using the GNU utility grep. It’s comparable to other static analysis applications like RATS, SWAAT and flaw-finder while keeping the technical requirements to a minimum and being very flexible.

Version 1.5

  • New features for server wide install
  • Source distro file for package maintainers
  • Signature bug fixes
  • New php, python and perl signatures
  • Deprecating the rough signature set
  • Fixed graudit usage text
  • Improved documentation
  • Several color modes supported

Graudit supports several options and tries to follow good shell practices. For a list of the options you can run graudit -h or see below.

The simplest way to use graudit is;
graudit <options> /path/to/scan

The following options are available:

  • -h prints a short help text
  • -v prints version number
  • -d database to use
  • -c number of lines of context to display, default is 2
  • -z supress colors

Update submitted by Wireghoul (graudit author)

Post scriptum

Compliance Mandates

  • Code Auditing :

    PCI/DSS 6.3.6, 6.3.7, 6.6, SOX A12.8, GLBA 16CFR Part 314.4(b) and (2);FISMA RA-5, SC-18, SA-11 SI-2, and ISO 27001/27002 (12.4.1, 12.4.3, 12.5)

  • Vulnerability Scanner :

    PCI DSS 11.2, 6.6, SOX A13.3, GLBA 16CFR Part 314.4(c), HIPAA 164.308(a)(8), FISMA RA-5, SI-2, ISO 27001-27002 12.6, 15.2.2


Related Articles

Code Auditing
Local auditing
Vulnerability Scanner