-
Notifications
You must be signed in to change notification settings - Fork 29
/
setup.py
36 lines (33 loc) · 1.21 KB
/
setup.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
from setuptools import setup, find_packages
setup(
name="py-find-injection",
version="0.1.1",
author="James Brown",
url="https://github.com/uber/py-find-injection",
description="simple python ast consumer which searches for common SQL injection attacks",
license='MIT (Expat)',
classifiers=[
"Programming Language :: Python",
"Operating System :: OS Independent",
"Topic :: Security",
"Topic :: Security",
"Intended Audience :: Developers",
"Development Status :: 3 - Alpha",
"Programming Language :: Python :: 2.7",
"License :: OSI Approved :: MIT License",
],
packages=find_packages(exclude=["tests"]),
entry_points={
"console_scripts": [
"py-find-injection = py_find_injection:main",
]
},
tests_require=["nose==1.3.0", "mock==1.0.1"],
test_suite="nose.collector",
long_description="""py_find_injection
Walks the AST and looks for arguments to cursor.execute or session.execute; then
determines whether string interpolation, concatenation or the .format() call is used
on those arguments. Not at all comprehensive, but better than nothing.
"""
)