brakeman
https://github.com/presidentbeef/brakeman
Ruby
A static analysis security vulnerability scanner for Ruby on Rails applications
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
3 Subscribers
Add a CodeTriage badge to brakeman
Help out
- Issues
- Fixed detection of UnscopedFind if optional: true is defined in the model and is not self-reference association
- False Positive 'Unescaped model attribute' when using safe '_html' i18n key
- False Positive on Faraday delete method with interpolation string
- Is it possible to enforce sanitization for all title attributes using `#h` or `#html_safe`?
- safe-methods: pass "pointed" methods?
- Additional CSRF deactivation checks
- Add Check: REDoS from match/match? coercing unsafe strings to regular expressions
- Expand Regex DoS check to include String#match and #match? coercion
- Fix markdown message with pipe character
- Shows ignored warnings on markdown output
- Docs
- Subscribe to help with docs for this repo and come back later