AtomShields CLI : Security Testing Framework For Repositories & Source Code

AtomShields Cli is a Command-Line Interface to use the software AtomShields. AtomShields is a security testing framework for repositories and source code.

This system has different modules that detect different vulnerabilities or files that may expose a risk, and the results obtained can be obtained or sent thanks to the reporting modules.

For developers: There is also the possibility to develop your own vulnerability detection (called checkers) or reporting modules. This tool offers certain facilities for those who want to implement their own modules, publish them and integrate them into the official ElevenPaths tool.

Also Read – ThreatIngestor : Extract & Aggregate Threat Intelligence

Installation

pip install atomshieldscli

Basic Usage

ascli <action> <context> –target <path> –name <project_name>

The allowed action values are:

  • install: To install a checker or a report, depending the context setted.
  • uninstall: To uninstall a checker or a report, depending the context setted.
  • run: To run the scan.
  • show: To show a checker list or a report list, depending the context setted.
  • help: Show the help

The allowed context values are:

  • checkers: Operate with checkers
  • reports: Operate with reports

The target option set the path to scan, or the plugin (checker/report) to install/uninstall.

Show All Checkers

ascli show checkers

Show All Reports

ascli show reports

Install Checker

ascli install checkers –target path/to/file.py

Install Report

ascli install reports –target path/to/file.py

Uninstall Checker

ascli uninstall checkers –target path/to/file.py
or
ascli uninstall checkers –target checker_name

Uninstall Report

ascli uninstall reports –target path/to/file.py
or
ascli uninstall reports –target checker_name

Run The Scan

ascli run –target path/to/file.py –name repo_name

R K

Recent Posts

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

1 day ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

1 day ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

1 day ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

3 days ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

6 days ago

How to Fix MyISAM Table Corruption in MySQL?

In MySQL Server 5.5 and earlier versions, the MyISAM was the default storage engine. So,…

1 week ago