{"id":20325764,"url":"https://github.com/aboutcode-org/aboutcode","last_synced_at":"2026-01-28T15:30:45.809Z","repository":{"id":41344702,"uuid":"66137501","full_name":"aboutcode-org/aboutcode","owner":"aboutcode-org","description":" AboutCode project: tools and data to uncover things about code: the provenance, origin, license, and more (packages, security, quality, etc.) of FOSS code. Get started at https://aboutcode.readthedocs.io/ ","archived":false,"fork":false,"pushed_at":"2025-12-15T21:56:24.000Z","size":15644,"stargazers_count":262,"open_issues_count":56,"forks_count":197,"subscribers_count":28,"default_branch":"main","last_synced_at":"2025-12-19T06:11:35.554Z","etag":null,"topics":["aboutcode","dejacode","license","purl","sbom","sca","scancode","security"],"latest_commit_sha":null,"homepage":"https://aboutcode.readthedocs.io/","language":"Batchfile","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/aboutcode-org.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":"CODE_OF_CONDUCT.rst","threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":"NOTICE","maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null},"funding":{"github":"aboutcode-org","open_collective":"aboutcode","custom":"https://causes.benevity.org/causes/056-5528680976845_a486"}},"created_at":"2016-08-20T08:49:24.000Z","updated_at":"2025-12-19T06:09:44.000Z","dependencies_parsed_at":"2024-01-18T12:55:25.966Z","dependency_job_id":"4e4b6a39-54da-4619-be43-5cc004d1d01e","html_url":"https://github.com/aboutcode-org/aboutcode","commit_stats":null,"previous_names":["aboutcode-org/aboutcode"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/aboutcode-org/aboutcode","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/aboutcode-org%2Faboutcode","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/aboutcode-org%2Faboutcode/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/aboutcode-org%2Faboutcode/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/aboutcode-org%2Faboutcode/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/aboutcode-org","download_url":"https://codeload.github.com/aboutcode-org/aboutcode/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/aboutcode-org%2Faboutcode/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28846337,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-01-28T15:15:36.453Z","status":"ssl_error","status_checked_at":"2026-01-28T15:15:13.020Z","response_time":57,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["aboutcode","dejacode","license","purl","sbom","sca","scancode","security"],"created_at":"2024-11-14T19:41:32.758Z","updated_at":"2026-01-28T15:30:45.803Z","avatar_url":"https://github.com/aboutcode-org.png","language":"Batchfile","readme":"# AboutCode\n\n### What is AboutCode?\n\nAboutCode is a family of FOSS projects to uncover metadata about software:\n\n-   where does the code come from? which software package?\n-   what is its license? copyright?\n-   is the code vulnerable, maintained, well coded?\n-   what are its dependencies, are there vulnerabilities/licensing issues?\n\nAll these are questions that are important to answer: there are millions of free\nand open source software components available on the web for reuse.\n\nKnowing where a software package comes from, what its license is and whether it\nis vulnerable should be a problem of the past such that everyone can safely\nconsume more free and open source software. We support not only open source\nsoftware, but also open data, generated and curated by our applications.\n\n\u003e [!NOTE]\n\u003e This is a repository with information on aboutcode open source\n\u003e activities and not the actual code repository. See the\n\u003e [projects section](https://github.com/aboutcode-org/aboutcode#projects) below\n\u003e for links to all the code repositories of our projects with a brief overview\n\u003e and our [wiki](https://github.com/aboutcode-org/aboutcode/wiki) if you are\n\u003e looking to participate.\n\n### Documentation Build\n\n![Doc Build](https://github.com/aboutcode-org/aboutcode/actions/workflows/docs-ci.yml/badge.svg)\n\n\u003e [!NOTE]\n\u003e To manually build the documentation, run the `$ make docs` command from \n\u003e the root of this repo.\n\n### Important Links\n\nOur homepage is at http://aboutcode.org\n\nOur documentation (in progress) is at\nhttps://aboutcode.readthedocs.io/en/latest/\n\nJoin the chat online at\n[app.gitter.im : aboutcode-org#discuss](https://app.gitter.im/#/room/#aboutcode-org_discuss:gitter.im)\nor if you're using the element app set the homeserver to `gitter.im` and then\njoin the\n[aboutcode-org#discuss](https://matrix.to/#/#aboutcode-org_discuss:gitter.im)\nchatroom. Introduce yourself and start the discussion!\n\nLook at our [wiki](https://github.com/aboutcode-org/aboutcode/wiki) for\ninformation about our participation in the GSoC program.\n\nWe have a weekly meeting, see more details\n[here](https://github.com/aboutcode-org/aboutcode/wiki/MeetingMinutes).\n\n### Projects\n\n## **ScanCode Toolkit** \n\n[https://github.com/aboutcode-org/scancode-toolkit](https://github.com/aboutcode-org/scancode-toolkit) \n\n### **What**\n\nScanCode Toolkit is a set of code scanning tools that detect the origin (copyrights), license and vulnerabilities of code, packages and dependencies in a codebase.\n\n### **Why**\n\nScanCode Toolkit is the leading tool in scanning depth and accuracy, used by hundreds of software teams. You can use ScanCode Toolkit as a command line tool or as a library.\n\n### **Maintainer**\n\nThe primary ScanCode Toolkit maintainer is [https://github.com/AyanSinhaMahapatra](https://github.com/AyanSinhaMahapatra)\n\n\n## [**ScanCode.io**](http://ScanCode.io)\n\n[https://github.com/aboutcode-org/scancode.io](https://github.com/aboutcode-org/scancode.io) \n\n### **What**\n\nScanCode.io provides a Web UI and API to run and review complex scans in rich scripted pipelines, on different kinds of containers, docker images, package archives, manifests etc, to get information on licenses, copyrights, sources, and vulnerabilities.\n\n### **Why**\n\nScanCode.io provides an easy-to-use front-end to ScanCode Toolkit and other AboutCode projects.The flexible pipeline technology supports advanced scanning tasks such as container scanning and deploy-to-develop analysis. You can run ScanCode.io in a Docker container or install it on a Linux server. It provides full support for generating and consuming CycloneDX and SPDX SBOMs.\n\n### **Maintainer**\n\nThe primary ScanCode.io maintainer is [https://github.com/tdruez](https://github.com/tdruez) \n\n## **ScanCode LicenseDB**\n\n[https://github.com/aboutcode-org/scancode-licensedb](https://github.com/aboutcode-org/scancode-licensedb) \n\n### **What**\n\nScanCode LIcenseDB is a free and open database of software and related licenses with over 2400 curated license texts, their metadata and ScanCode license detection rules. There is a public database available at: [https://scancode-licensedb.aboutcode.org/](https://scancode-licensedb.aboutcode.org/) \n\n### **Why**\n\nScanCode LIcenseDB provides the most comprehensive list of software license identifiers, supporting SPDX-compliant license expressions. API access is available to the public database. \n\n### **Maintainer**\n\nThe primary ScanCode LIcenseDB maintainers are [https://github.com/AyanSinhaMahapatra](https://github.com/AyanSinhaMahapatra) and [https://github.com/DennisClark](https://github.com/DennisClark)\n\n\n## **ScanCode Workbench** \n\n[https://github.com/aboutcode-org/scancode-workbench](https://github.com/aboutcode-org/scancode-workbench) \n\n### **What**\n\nScanCode Workbench is an application to visualize and review scan results from ScanCode Toolkit scans. You can install and use the Workbench on a Linux, MacOS or Windows desktop.\n\n### **Why**\n\nScanCode Workbench provides an easy-to-use tool to review and edit ScanCode Toolkit results.\n\n### **Maintainer**\n\nThe primary ScanCode Workbench maintainers are [https://github.com/AyanSinhaMahapatra](https://github.com/AyanSinhaMahapatra) and [https://github.com/mjherzog](https://github.com/mjherzog) \n\n## **DejaCode** \n\n[https://github.com/aboutcode-org/dejacode](https://github.com/aboutcode-org/dejacode) \n\n### **What**\n\nDejaCode provides an enterprise-level application to automate open source license compliance and ensure software supply chain integrity, powered by ScanCode.\n\n### **Why**\n\nDejaCode is your system of record as a single source of truth with quality data for licenses, vulnerabilities, and package provenance and metadata, enabling you to ensure FOSS compliance with enterprise-grade features and integrations for DevOps and software systems.\n\n### **Maintainer**\n\nThe primary DejaCode maintainers are [https://github.com/tdruez](https://github.com/tdruez) and [https://github.com/DennisClark](https://github.com/DennisClark) \n\n## **VulnerableCode**\n\n[https://github.com/aboutcode-org/vulnerablecode](https://github.com/aboutcode-org/vulnerablecode) \n\n### **What**\n\nVulnerableCode provides a Web UI and API to access a database of known software package vulnerabilities with comprehensive information from upstream and downstream public sources including packages affected by a vulnerability and packages that fix a vulnerability. There is a public VulnerableCode database at: [https://public.vulnerablecode.io/](https://public.vulnerablecode.io/) and the project also provides the tools to build your own instance of the database.\n\n### **Why**\n\nKnown software package vulnerabilities are aggregated in a single database to query a richer graph of relations between multiple versions of a package identified by Package-URL (PURL).\n\n### **Maintainer**\n\nThe primary VulnerableCode maintainers are [https://github.com/TG1999](https://github.com/TG1999) and [https://github.com/keshav-space](https://github.com/keshav-space) \n\n## **PURLDB**\n\n[https://github.com/aboutcode-org/purldb](https://github.com/aboutcode-org/purldb) \n\n### **What**\n\nPURLDB provides tools to create and update a database of package metadata keyed by PURL (Package URL) and an API for the PURL data.\n\n### **Why**\n\nTake advantage of the PURLDB to get fast pre-scanned metadata for popular software packages, integrated with other AboutCode projects. \n\n### **Maintainer**\n\nThe primary PURLDB maintainer is [https://github.com/JonoYang](https://github.com/JonoYang) \n\n# **AboutCode Inspectors** \n\nInspectors are special-purpose analysis tools. You can run them as a ScanCode Toolkit plugin, or steps in a [ScanCode.io](http://scancode.io) pipeline or from the command line.\n\n## **binary-inspector** \n\n[https://github.com/aboutcode-org/binary-inspector](https://github.com/aboutcode-org/binary-inspector) \n\n### **What**\n\nbinary-inspector is a utility to extract symbols from various kinds of binaries, i.e. ELF, Mach-O, WinPE and other binary formats. \n\n### **Why**\n\nbinary-inspector supports the analysis intended to determine the code sources of a binary object and is designed to be used as a ScanCode Toolkit plugin or integrated in ScanCode.io pipelines.\n\n### **Maintainer**\n\nThe primary binary-inspector maintainer is [https://github.com/AyanSinhaMahapatra](https://github.com/AyanSinhaMahapatra) \n\n## **container-inspector** \n\n[https://github.com/aboutcode-org/container-inspector](https://github.com/aboutcode-org/container-inspector) \n\n### **What**\n\ncontainer-inspector is a tool to analyze the structure and provenance of software components in Docker images using static analysis.\n\n### **Why**\n\ncontainer-inspector supports the analysis of the contents of the various layers of a container and is designed to be integrated in ScanCode.io pipelines.\n\n### **Maintainer**\n\nThe primary container-inspector maintainers are [https://github.com/JonoYang](https://github.com/JonoYang) and [https://github.com/chinyeungli](https://github.com/chinyeungli) \n\n## **source-inspector**\n\n[https://github.com/aboutcode-org/source-inspector](https://github.com/aboutcode-org/source-inspector) \n\n### **What**\n\nsource-inspector is a set of utilities to inspect and analyze source code and collect interesting data such as code symbols, strings and comments.  \n\n### **Why**\n\nsource-inspector supports the analysis of source code and is designed to be used as a ScanCode Toolkit plugin\n\n### **Maintainer**\n\nThe primary source-inspector maintainer is [https://github.com/JonoYang](https://github.com/JonoYang) \n\n## **nuget-inspector** \n\n[https://github.com/aboutcode-org/nuget-inspector](https://github.com/aboutcode-org/nuget-inspector) \n\n### **What**\n\nnuget-inspector is a tool to inspect manifests and code to resolve dependencies (vulnerable and non-vulnerable) for nuget packages.  \n\n### **Why**\n\nNuget-inspector provides a reliable way to analyze .NET code projects and their dependencies independently of the availability of a dotnet SDK installed on the machine that runs this analysis. It is a comprehensive tool that can handle every style of .NET and NuGet projects and package layouts, manifests and lockfiles.\n\n### **Maintainer**\n\nThe primary nuget-inspector maintainer is [https://github.com/JonoYang](https://github.com/JonoYang)\n\n## **python-inspector** \n\n[https://github.com/aboutcode-org/python-inspector](https://github.com/aboutcode-org/python-inspector) \n\n### **What**\n\npython-inspector is a tool to inspect manifests and code to resolve dependencies (vulnerable and non-vulnerable) for python packages.  \n\n### **Why**\n\npython-inspector supports ScanCode to find and analyze PyPI archives and installed Python packages and their files. It is a comprehensive library that can handle every style of Python package layouts, manifests and lockfiles.\n\n### **Maintainer**\n\nThe primary python-inspector maintainers are [https://github.com/TG1999](https://github.com/TG1999) and  [https://github.com/chinyeungli](https://github.com/chinyeungli) \n\n## **debian-inspector**  \n\n[https://github.com/aboutcode-org/debian-inspector](https://github.com/aboutcode-org/debian-inspector) \n\n### **What**\n\ndebian-inspector is a tool to inspect debian codebases.  \n\n### **Why**\n\ndebian-inspector is more flexible than other libraries, capable of parsing and inspecting almost correct control files that are not fully machine readable. \n\n### **Maintainer**\n\nThe primary debian-inspector maintainers are [https://github.com/JonoYang](https://github.com/JonoYang) and  [https://github.com/AyanSinhaMahapatra](https://github.com/AyanSinhaMahapatra) \n\n## **elf-inspector** \n\n[https://github.com/aboutcode-org/elf-inspector](https://github.com/aboutcode-org/elf-inspector) \n\n### **What**\n\nelf-inspector is a set of utilities to inspect binary ELF files and collect interesting data from them. \n\n### **Why**\n\nelf-inspector is designed to be used as a ScanCode Toolkit plugin as well as integrated in ScanCode.io pipelines.\n\n### **Maintainer**\n\nThe primary elf-inspector maintainer is [https://github.com/AyanSinhaMahapatra](https://github.com/AyanSinhaMahapatra) \n\n## **go-inspector** \n\n[https://github.com/aboutcode-org/go-inspector](https://github.com/aboutcode-org/go-inspector) \n\n### **What**\n\ngo-inspector is a utility to extract dependencies and symbols from Go binaries.  \n\n### **Why**\n\ngo-inspector is designed to be used as a ScanCode Toolkit plugin as well as integrated in ScanCode.io pipelines. \n\n### **Maintainer**\n\nThe primary go-inspector maintainer is [https://github.com/JonoYang](https://github.com/JonoYang)\n\n\n## **rust-inspector** \n\n[https://github.com/aboutcode-org/rust-inspector](https://github.com/aboutcode-org/rust-inspector) \n\n### **What**\n\nrust-inspector is a utility to extract dependencies and symbols from Rust binaries.\n\n### **Why**\n\nrust-inspector is designed to be used as a ScanCode Toolkit plugin as well as integrated in ScanCode.io pipelines. \n\n### **Maintainer**\n\nThe primary rust-inspector maintainer is [https://github.com/AyanSinhaMahapatra](https://github.com/AyanSinhaMahapatra)\n\n\n# **AboutCode Libraries**\n\n## **license-expression**\n\n[https://github.com/aboutcode-org/license-expression](https://github.com/aboutcode-org/license-expression) \n\n### **What**\n\nlicense-expression is a library to parse, analyze, compare and normalize SPDX and SPDX-like license expressions using a boolean logic expression engine. The underlying boolean engine is at: [https://github.com/bastikr/boolean.py](https://github.com/bastikr/boolean.py) .\n\n### **Why**\n\nlicense-expression  is designed to be used as a ScanCode Toolkit plugin as well as integrated in ScanCode.io pipelines. \n\n### **Maintainer**\n\nThe primary license-expression maintainer is [https://github.com/AyanSinhaMahapatra](https://github.com/AyanSinhaMahapatra) \n\n## **commoncode**\n\n[https://github.com/aboutcode-org/commoncode](https://github.com/aboutcode-org/commoncode) \n\n### **What**\n\ncommoncode provides a set of common functions and utilities for handling various things like paths, dates, files and hashes.\n\n### **Why**\n\ncommoncode is shared by multiple AboutCode projects. \n\n### **Maintainer**\n\nThe primary commoncode maintainer is [https://github.com/AyanSinhaMahapatra](https://github.com/AyanSinhaMahapatra) \n\n\n## **extractcode** \n\n[https://github.com/aboutcode-org/extractcode](https://github.com/aboutcode-org/extractcode) \n\n### **What**\n\nextractcode is a mostly universal file extraction library and CLI tool to extract almost any archive in a reasonably safe way on Linux, macOS and Windows.\n\n### **Why**\n\nextractcode supports  one of the largest number of archive formats and will extract things where other archive and compressed file extractors may fail.\n\n### **Maintainer**\n\nThe primary extractcode maintainer is [https://github.com/JonoYang](https://github.com/JonoYang)\n\n\n## **fetchcode**\n\n[https://github.com/aboutcode-org/fetchcode](https://github.com/aboutcode-org/fetchcode) \n\n### **What**\n\nfetchcode is a utility to reliably fetch any code via HTTP, FTP and version control systems such as git.\n\n### **Why**\n\nIt is surprisingly difficult to have a simple API to consistently fetch code from package repositories, version control repositories and APIs: each site and each package manager has its own unique and peculiar ways. FetchCode goal is to abstract all these details and make it easy to fetch things reliably. \n\n### **Maintainer**\n\nThe primary fetchcode maintainer is [https://github.com/JonoYang](https://github.com/JonoYang)\n\n\n# **Other AboutCode Tools**\n\n## **aboutcode-toolkit**\n\n[https://github.com/aboutcode-org/aboutcode-toolkit](https://github.com/aboutcode-org/aboutcode-toolkit) \n\n### **What**\n\naboutcode-toolkit is a set of command line tools to document the provenance of your code and generate attribution notices. aboutcode-toolkit uses small yaml files to document code provenance inside a codebase.\n\n### **Why**\n\nThe aboutcode-toolkit and ABOUT files provide a simple way to document the origin, license, usage and other important or interesting information about third-party software components that you use in your project. \n\n### **Maintainer**\n\nThe primary aboutcode-toolkit maintainer is [https://github.com/chinyeungli](https://github.com/chinyeungli)\n\n\n## **univers**\n\n[https://github.com/aboutcode-org/univers](https://github.com/aboutcode-org/univers) \n\n### **What**\n\nunivers is a Python package to parse and compare all package versions and package version ranges. Parse and compare all the package versions and all the ranges. From debian, npm, pypi, ruby and more. Process all the version range specs and expressions. \n\n### **Why**\n\nunivers provides a mostly universal way to store version ranges and to compare two software package versions in VulnerableCode.\n\n### **Maintainer**\n\nThe primary univers maintainer is [https://github.com/TG1999](https://github.com/TG1999)\n\n\n## **federatedcode**\n\n[https://github.com/aboutcode-org/federatedcode](https://github.com/aboutcode-org/federatedcode) \n\n### **What**\n\nfederatedcode is a decentralized, federated metadata system for open source software code and security information.\n\n### **Why**\n\nfederatedcode is funded, supported and sponsored by multiple global organizations. \n\n### **Maintainer**\n\nThe primary federatedcode maintainer is [https://github.com/keshav-space](https://github.com/keshav-space)\n\n\n## **AboutCode Data**\n\n### **What**\n\nAboutCode Data is a simple set of conventions to define data structures that all the AboutCode tools can understand and use to exchange data. ABOUT files and ScanCode Toolkit data are examples of this approach.\n\n### **Why**\n\nAboutCode Data supports other projects such as [https://libraries.io](https://libraries.io/) and and [OSS Review Toolkit](https://github.com/heremaps/oss-review-toolkit) \n\n# **AboutCode Standards and Related Projects**\n\nAboutCode is based on key industry standards.\n\n## **PURL** \n\n[https://github.com/package-url/purl-spec](https://github.com/package-url/purl-spec) \n\n### **What**\n\nA purl is a URL string used to identify and locate a software package in a mostly universal and uniform way across programming languages, package managers, packaging conventions, tools, APIs and databases. \n\n### **Why**\n\nPURL supports accuracy of software identification in SBOMs. PURL originated from ScanCode and is in process to become an Ecma standard.\n\n### **Maintainer**\n\nThe primary PURL maintainer is [https://github.com/johnmhoran](https://github.com/johnmhoran)\n\n## **VERS**\n\n### **What**\n\nVERS is an emerging specification for the resolution of dependency and vulnerable version ranges.\n\n### **Why**\n\nVERS originated as part of the PURL project and is in process to become an Ecma standard.\n\n### **Specification**\n\nSee [https://github.com/package-url/purl-spec/blob/c29b870ab33382309eefee2a0975ef7f71fdb742/VERSION-RANGE-SPEC.rst](https://github.com/package-url/purl-spec/blob/c29b870ab33382309eefee2a0975ef7f71fdb742/VERSION-RANGE-SPEC.rst) \n\n## **Related FOSS orgs and projects**\n\nWe also co-started and work closely with other FOSS orgs and projects:\n\n-   [Package URL](https://github.com/package-url): a widely used standard to identify\n    precisely software packages of all types with simple, readable and concise URLs.\n    The PURL standard is currently being prepared for Ecma standardization.\n    See https://github.com/package-url/purl-spec/discussions for more details.\n\n-   [SPDX](http://SPDX.org): aka System Package Data Exchange, a spec to\n    document the origin and licensing of packages.\n\n-   [CycloneDX](https://cyclonedx.org) aka. OWASP CycloneDX is a full-stack Bill\n    of Materials (BOM) standard that provides advanced supply chain capabilities\n    for cyber risk reduction\n\n-   [ClearlyDefined](https://ClearlyDefined.io): a project to review and help\n    FOSS projects improve their licensing and documentation clarity. This\n    project is incubating with https://opensource.org\n","funding_links":["https://github.com/sponsors/aboutcode-org","https://opencollective.com/aboutcode","https://causes.benevity.org/causes/056-5528680976845_a486"],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Faboutcode-org%2Faboutcode","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Faboutcode-org%2Faboutcode","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Faboutcode-org%2Faboutcode/lists"}