Skip to content

gssakash/owasp-static-scanner

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

OWASP Python Static Scanner

A simple regex-based static analysis tool to identify potential OWASP Top 10 (2021) issues in Python code.
For educational use only — not a replacement for professional SAST tools.

Implemented OWASP Checks

Code Title Description
A01 Broken Access Control Detects routes/endpoints missing auth decorators (@login_required, Depends, etc.)
A02 Cryptographic Failures Flags weak hashes (md5, sha1) and hardcoded secrets (passwd, api_key)
A03 Injection Finds unsafe calls (os.system, eval, subprocess) and raw SQL string usage
A05 Security Misconfiguration Detects DEBUG=True, weak SECRET_KEYs, or development=True
A06 Vulnerable and Outdated Components Flags imports of outdated third-party libraries or frameworks; detects version strings or unpatched dependencies that may expose known CVEs.
A07 Auth Failures Flags insecure JWT decoding (verify=False) and direct session handling
A09 Logging Failures Detects print/logging of sensitive data (password, token, secret)
A10 SSRF Flags user-controlled URLs in requests.get, urlopen, httpx.get

Setup (Poetry)

pip install poetry
cd owasp-static-scanner
poetry install
poetry shell

Usage

Outputs a console report listing detected patterns by file and line number.

References

About

Lightweight static code analysis for detecting common OWASP Top 10 Python vulnerabilities

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages