You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Oct 6, 2020. It is now read-only.
The Python cryptography library has become the defacto standard for crytographic operations. We should detect known-insecure crytographic operations, e.g.
cryptography.hazmat.primitives.hashes.MD5
cryptography.hazmat.primitives.hashes.SHA1
cryptography.hazmat.primitives.ciphers.modes.ECB
We should also investigate if there are any other pieces of functionality in the library worth detecting.
The text was updated successfully, but these errors were encountered:
Looks like you have significant experience in the Python + security space. Are there any other mainstream libraries you can think of that would be worth creating Dlint rules for and/or investigating? So far I have requests, pycrypto, cryptography (here), defusedxml (#5), Duo's API client library, and OneLogin's SAML library.
I could look at some of the big webservers (e.g. Django, Pyramid, Flask), but that may not be as useful or easy to detect insecurities as common libraries.
The Python cryptography library has become the defacto standard for crytographic operations. We should detect known-insecure crytographic operations, e.g.
cryptography.hazmat.primitives.hashes.MD5
cryptography.hazmat.primitives.hashes.SHA1
cryptography.hazmat.primitives.ciphers.modes.ECB
We should also investigate if there are any other pieces of functionality in the library worth detecting.
The text was updated successfully, but these errors were encountered: