http://findbugs.sourceforge.net/eclipse/
Get from the?latest release?the package including the tool.
The content should look like this:
> unzip findsecbugs-cli.zip> cd findsecbugs-cli> lsfindsecbugs.batfindsecbugs.shinclude.xmllib
> findsecbugs.bat -high C:\Java\jenkins\WEB-INF\lib\remoting-2.53.jarH S CIPINT: The cipher does not provide data integrity At HandshakeCiphers.java:[line 111]H S CIPINT: The cipher does not provide data integrity At HandshakeCiphers.java:[line 113]H S CIPINT: The cipher does not provide data integrity At ChannelCiphers.java:[line 89]H S CIPINT: The cipher does not provide data integrity At ChannelCiphers.java:[line 91]H S SECOBDES: Object deserialization is used in hudson.remoting.Capability.read(InputStream) At Capability.java:[line 139]H S SECOBDES: Object deserialization is used in hudson.remoting.Command.readFrom(Channel, ObjectInputStream) At Command.java:[line 92]H S SECOBDES: Object deserialization is used in hudson.remoting.UserRequest.deserialize(Channel, byte[], ClassLoader) At UserRequest.java:[line 184]H S SECOBDES: Object deserialization is used in hudson.remoting.RemoteInputStream.readObject(ObjectInputStream) At RemoteInputStream.java:[line 179]H S SECOBDES: Object deserialization is used in hudson.remoting.ClassLoaderHolder.readObject(ObjectInputStream) At ClassLoaderHolder.java:[line 35]H S CIPINT: The cipher does not provide data integrity At Launcher.java:[line 289]H S SECPTI: File(...) reads a file whose location might be specified by user input At CmdLineParser.java:[line 552]
The following command will redirect all the result in a HTML report.
> findsecbugs.bat -progress -html -output report.htm C:\Java\jenkins\WEB-INF\lib\remoting-2.53.jarScanning archives (1 / 1)2 analysis passes to performPass 1: Analyzing classes (1010 / 1010) - 100% completePass 2: Analyzing classes (349 / 349) - 100% completeDone with analysis
On linux:
> find /some/application/ -name \*.jar > libs.txt> cat libs.txt | findsecbugs.sh -xargs -progress -html -output report.htm Scanning archives (156 / 156)2 analysis passes to performPass 1: Analyzing classes (16922 / 48118) - 35% complete
On Windows:
> dir "C:/Some/Application/" /s /b | findstr \.jar$ > libs.txt> cat libs.txt | findsecbugs.bat -xargs -progress -html -output report.htm Scanning archives (156 / 156)2 analysis passes to performPass 1: Analyzing classes (16922 / 48118) - 35% complete
To see the available option use the argument?-help
.
> findsecbugsNo files to be analyzedUsage: findbugs [general options] -textui [command line options...] [jar/zip/class files, directories...]General options: -jvmArgs args Pass args to JVM -maxHeap size Maximum Java heap size in megabytes (default=768) -javahome <dir> Specify location of JRE General FindBugs options: -project <project> analyze given project -home <home directory> specify FindBugs home directory -pluginList <jar1[;jar2...]> specify list of plugin Jar files to load -effort[:min|less|default|more|max] set analysis effort level -adjustExperimental lower priority of experimental Bug Patterns -workHard ensure analysis effort is at least 'default' -conserveSpace same as -effort:min (for backward compatibility) -showPlugins show list of available detector plugins -userPrefs <filename> user preferences file, e.g /path/to/project/.settings/edu.umd.cs.findbugs.core.prefs for Eclipse projects Output options: -timestampNow set timestamp of results to be current time -quiet suppress error messages -longBugCodes report long bug codes -progress display progress in terminal window -release <release name> set the release name of the analyzed application -experimental report of any confidence level including experimental bug patterns -low report warnings of any confidence level -medium report only medium and high confidence warnings [default] -high report only high confidence warnings -maxRank <rank> only report issues with a bug rank at least as scary as that provided -dontCombineWarnings Don't combine warnings that differ only in line number -sortByClass sort warnings by class -xml[:withMessages] XML output (optionally with messages) -xdocs xdoc XML output to use with Apache Maven -html[:stylesheet] Generate HTML output (default stylesheet is default.xsl) -emacs Use emacs reporting format -relaxed Relaxed reporting mode (more false positives!) -train[:outputDir] Save training data (experimental); output dir defaults to '.' -useTraining[:inputDir] Use training data (experimental); input dir defaults to '.' -redoAnalysis <filename> Redo analysis using configureation from previous analysis -sourceInfo <filename> Specify source info file (line numbers for fields/classes) -projectName <project name> Descriptive name of project -reanalyze <filename> redo analysis in provided file -output <filename> Save output in named file -nested[:true|false] analyze nested jar/zip archives (default=true) Output filtering options: -bugCategories <cat1[,cat2...]> only report bugs in given categories -onlyAnalyze <classes/packages> only analyze given classes and packages; end with .* to indicate classes in a package, .- to indicate a package prefix -excludeBugs <baseline bugs> exclude bugs that are also reported in the baseline xml output -exclude <filter file> exclude bugs matching given filter -include <filter file> include only bugs matching given filter -applySuppression Exclude any bugs that match suppression filter loaded from fbp file Detector (visitor) configuration options: -visitors <v1[,v2...]> run only named visitors -omitVisitors <v1[,v2...]> omit named visitors -chooseVisitors <+v1,-v2,...> selectively enable/disable detectors -choosePlugins <+p1,-p2,...> selectively enable/disable plugins -adjustPriority <v1=(raise|lower)[,...]> raise/lower priority of warnings for given visitor(s) Project configuration options: -auxclasspath <classpath> set aux classpath for analysis -auxclasspathFromInput read aux classpath from standard input -auxclasspathFromFile <filepath> read aux classpaths from a designated file -sourcepath <source path> set source path for analyzed classes -exitcode set exit code of process -noClassOk output empty warning file if no classes are specified -xargs get list of classfiles/jarfiles from standard input rather than command line -analyzeFromFile <filepath> get the list of class/jar files from a designated file -cloud <id> set cloud id -cloudProperty <key=value> set cloud property -bugReporters <name,name2,-name3> bug reporter decorators to explicitly enable/disable -printConfiguration print configuration and exit, without running analysis -version print version, check for updates and exit, without running analysis
To get more information, visit FindBugs official documentation.?http://findbugs.sourceforge.net/manual/running.html
Using Find Security Bugs on a large number of jars:?http://blog.h3xstream.com/2016/01/deserialization-vulnerability.html
本文由 貴州做網站公司 整理發布,部分圖文來源于互聯網,如有侵權,請聯系我們刪除,謝謝!
網絡推廣與網站優化公司(網絡優化與推廣專家)作為數字營銷領域的核心服務提供方,其價值在于通過技術手段與策略規劃幫助企業提升線上曝光度、用戶轉化率及品牌影響力。這...
在當今數字化時代,公司網站已成為企業展示形象、傳遞信息和開展業務的重要平臺。然而,對于許多公司來說,網站建設的價格是一個關鍵考量因素。本文將圍繞“公司網站建設價...
在當今的數字化時代,企業網站已成為企業展示形象、吸引客戶和開展業務的重要平臺。然而,對于許多中小企業來說,高昂的網站建設費用可能會成為其發展的瓶頸。幸運的是,隨...
成都五環路什么時候開建的? 2020年11月2日,成都五環路正式開工??!成都市五環路工程啟動儀式在五環路與成綿復線高速公路青白江連接段舉行,預計2023年完工。成都五環雙流段何時動工?2017年6月1日,成都市批準《關于環路命名事宜的請示》市民政局。經研究,市原則同意命名 "成環路 "作為五環路的命名方案。成都五環2020年11月2日開工建設。成都五環項目啟動儀式在青白江區舉行,預計2023年12...
sony油壺和香水瓶哪個好?香水瓶不錯。索尼-KW1神器采用香水瓶的設計風格,并有白色、粉色、紫色和綠色,以及四種珠光顏色可供選擇。鏡頭的設計融入了施華洛世奇元素,高貴典雅,采用透明保護殼,可以起到一定的保護作用。也更像是香水瓶的蓋子,設計簡潔時尚。這款神器整體設計小巧,僅重120g,攜帶方便。索尼香水瓶和魚雷哪個高端?索尼香水瓶和索尼魚雷都是mp3產品。如果看價格,魚雷更高檔。索尼的香水瓶配什么...
索愛k550怎么樣?索尼K550c/K550i參考價格:1250元優勢1.操作簡單,系統反應迅速。2:擁有14mm的超薄機身。3.具有豐富的視聽娛樂功能。4:支持自動對焦和實用相機功能。劣勢1.屏幕分辨率低。2.設計獨特的按鍵,手感不好。3.作為一款Cyber-shot手機,拍照功能缺乏亮點。索愛w700和k750c哪個好?愛W系列主打音樂播放器,K系列主打照片播放器。兩個系列定位不同,看你是喜歡...