Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

If anyone ever check this thread: it works well. Use the json output, and it'll show the call path for each "capability" it detects (network, arbitrary code execution, ...). I use this on the output to organize it into a spreadsheet and scan quickly:

    jq -r '.capabilityInfo[] | [.capability, .depPath | split(" ") | reverse | join(" ")] | @tsv'


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: