Categories: Kali Linux

Electronegativity : A Tool to Identify Misconfigurations & Security Anti-Patterns in Electron Applications

Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron-based applications.

Software developers and security auditors can use this tool to detect and mitigate potential weaknesses and implementation bugs when developing applications using Electron.

A good understanding of Electron (in)security is still required when using it, as some of the potential issues detected by the tool require manual investigation.

Also Read : PHP : Security Check List 2019

Installation

Major releases are pushed to NPM and can be simply installed using:

$ npm install @doyensec/electronegativity -g

Usage

$ electronegativity -h

OptionDescription
-Voutput the version number
-i, –inputinput (directory, .js, .html, .asar)
-o, –outputsave the results to a file in csv or sarif format
-c, –checksonly run the specified checks, passed in csv format
-h, –helpoutput usage information

Using it to look for issues in a directory containing an Electron app:

$ electronegativity -i /path/to/electron/app

Using the tool to look for issues in an asar archive and saving the results in a csv file:

$ electronegativity -i /path/to/asar/archive -o result.csv

Note: If you’re running into the Fatal Error “JavaScript heap out of memory”, you can run node using node –max-old-space-size=4096 electronegativity -i /path/to/asar/archive -o result.csv

Credit :  Claudio MerloniIbram MarzoukJaroslav Lobačevski and many other contributors.

R K

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

6 days ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

6 days ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

6 days ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

6 days ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

1 week ago