{"id":20309153,"url":"https://github.com/boloto1979/code-sentinel","last_synced_at":"2025-04-11T15:40:34.426Z","repository":{"id":161841846,"uuid":"636219927","full_name":"boloto1979/Code-Sentinel","owner":"boloto1979","description":"The project is a Python Code Sentinel that scans code files for potential security vulnerabilities. The goal is to identify suspicious patterns in the code that could indicate the presence of vulnerabilities.","archived":false,"fork":false,"pushed_at":"2023-12-24T02:10:43.000Z","size":64331,"stargazers_count":7,"open_issues_count":1,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-25T11:49:23.404Z","etag":null,"topics":["csrf","cybersecurity","python","sql","sqlinjection","ssrf","xss","xss-vulnerability"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/boloto1979.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE.md","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2023-05-04T11:18:12.000Z","updated_at":"2025-03-01T18:52:13.000Z","dependencies_parsed_at":"2024-11-14T17:40:18.139Z","dependency_job_id":null,"html_url":"https://github.com/boloto1979/Code-Sentinel","commit_stats":null,"previous_names":[],"tags_count":1,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/boloto1979%2FCode-Sentinel","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/boloto1979%2FCode-Sentinel/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/boloto1979%2FCode-Sentinel/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/boloto1979%2FCode-Sentinel/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/boloto1979","download_url":"https://codeload.github.com/boloto1979/Code-Sentinel/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":248432873,"owners_count":21102462,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["csrf","cybersecurity","python","sql","sqlinjection","ssrf","xss","xss-vulnerability"],"created_at":"2024-11-14T17:25:55.455Z","updated_at":"2025-04-11T15:40:34.418Z","avatar_url":"https://github.com/boloto1979.png","language":"Python","readme":"# Code Sentinel\n![Demonstration](./layout/img/the-sentinel.jpg)\u003cbr\u003e\u003cbr\u003e\nCode Sentinel is a Python application that analyzes code files for vulnerabilities. It helps identify potential security issues such as code injection, cross-site scripting (XSS), SQL injection, CSRF (Cross-Site Request Forgery), SSRF (Server-Side Request Forgery), LFI (Local File Inclusion) and RFI (Remote File Inclusion).\n\n## Features\n- Supports various programming languages including Python, Java, JavaScript, C, C++, Ruby, HTML, and PHP.\n- Analyzes code files for vulnerabilities.\n- Displays vulnerability details including type, pattern, and line number.\n- Provides a user-friendly graphical interface for file selection and displaying results.\n\n## Installation\nTo use Code Sentinel, follow the steps below:\n\n1. Clone the repository:\n```\ngit clone https://github.com/boloto1979/Code-Sentinel.git\n```\n2. Install the required dependencies:\n\n```\npip install -r requirements.txt\n```\n\n```\npip install re\npip install tkinter\npip install Pillow\npip install ttkthemes\n```\n## Usage\nTo run Code Sentinel, execute the following command:\n```\npython3 CodeSentinel.py\n```\nThe Code Sentinel window will appear, allowing you to perform the following actions:\n- Click the \"Anexar Arquivo\" (Attach File) button to select a code file for analysis.\n- Once the file is selected, Code Sentinel will analyze it for vulnerabilities.\n- If vulnerabilities are found, they will be displayed in the application window, showing the type, pattern, and line number of each vulnerability.\n- If no vulnerabilities are found, a message indicating this will be displayed.\n\nPlease note that Code Sentinel supports the following file extensions: `.py`, `.java`, `.js`, `.c`, `.cpp`, `.html`, and `.php`.\n\n## Vulnerability Detection\nCode Sentinel detects the following types of vulnerabilities:\n- Code Injection: It searches for patterns such as eval(, exec(, os.system(, subprocess.run(, $(, and `.*` in the code.\n- XSS (Cross-Site Scripting): It looks for patterns like \u003cscript\u003e...\u003c/script\u003e and \u003cimg...src=...onerror=...\u003e.\n- SQL Injection: It identifies patterns such as SELECT *, DROP TABLE, and DELETE FROM in the code (case-insensitive).\n- CSRF (Cross-Site Request Forgery).\n- SSRF (Server-Side Request Forgery).\n- LFI (Local File Inclusion) and RFI (Remote File Inclusion).\n\nPlease note that the CSRF and SSRF vulnerability detections are not yet implemented in the current version of Code Sentinel.\n\n## Contributions\nContributions to Code Sentinel are welcome! If you would like to contribute, please follow these steps:\n1. Fork the repository.\n2. Create a new branch for your feature or bug fix.\n3. Develop and test your changes.\n4. Commit your changes and push them to your fork.\n5. Submit a pull request explaining your changes.\n\nAlso, if you want to be part of the project and organization, please contact me: ``` pedro.lima1979@hotmail.com```\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fboloto1979%2Fcode-sentinel","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fboloto1979%2Fcode-sentinel","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fboloto1979%2Fcode-sentinel/lists"}