CodeWarrior – Code Analysis Tool And Static Analysis Tool

Just another manual code analysis tool and static analysis tool Codewarrior runs at HTTPd with TLS, uses KISS principle( https://en.wikipedia.org/wiki/KISS_principle )
Directories:

web/ = local of javascripts and html and css sources
src/ = C source code, this code talking with web socket
eggs/ = external modules to search codes using regex
conf/whitelist.conf = list of IPs that have access in HTTPd server
bin/ = file to execute…
doc/ = at construction…

Don’t need install, just compile and run, don’t have external libs… runs at Linux, BSD and MacOS.

  • git clone ttps://github.com/CoolerVoid/codewarrior/; cd codewarrior
  • $ make
  • $ cd cert; openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:2048 -keyout privateKey.key -out certificate.crt
  • $ cat certificate.crt privateKey.key > certkey.pem
  • $ cd ..
  • $ /bin/warrior

Open browser at https://localhost:1345/index.html

Notes:

  • if screen stock you reflesh browser with F5…
  • If return error, port already in use… close it with…
  • $ fuser -k -n tcp 1345
  • If you want use at network, Whitelist to access server you can edit at “config/whitelist.conf”.

Tested at path:
https://github.com/joostvanveen/php-security-pitfalls

Tricks:

  • if you want change cert “cert/certpem.pem” generate with openssl cartificate and key and concatenate both…
  • all html code and web sockets + javascript code you can view at path “web/”
  • if you change the default port you need edit port in web/ at web sockets connection.

TODO:

  • Add external Automatons for each language case
  • Add load module with dlopen()
  • Add ReDOS validator at regex calls
  • Machine learning so try use bag of Words with KNN

Author: CoolerVoid

download now

Advertisements

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: