[Bug 576431] New: Package Review: skipfish - Web application security scanner

bugzilla at redhat.com bugzilla at redhat.com
Wed Mar 24 01:58:24 UTC 2010


Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.

Summary: Package Review: skipfish - Web application security scanner

https://bugzilla.redhat.com/show_bug.cgi?id=576431

           Summary: Package Review: skipfish - Web application security
                    scanner
           Product: Fedora
           Version: 12
          Platform: All
        OS/Version: Linux
            Status: NEW
          Severity: medium
          Priority: low
         Component: Package Review
        AssignedTo: nobody at fedoraproject.org
        ReportedBy: rebus at seznam.cz
         QAContact: extras-qa at fedoraproject.org
                CC: notting at redhat.com, fedora-package-review at redhat.com
   Estimated Hours: 0.0
    Classification: Fedora


SPEC Url: http://rebus.webz.cz/d/skipfish.SPEC
SRPM Url: http://rebus.webz.cz/d/skipfish-1.16b-1.fc12.src.rpm

A fully automated, active web application security reconnaissance tool 
released recently by Google.

Key features:
High speed: pure C code, highly optimized HTTP handling, minimal CPU
footprint - easily achieving 2000 requests per second with responsive targets.

Ease of use: heuristics to support a variety of quirky web frameworks
and mixed-technology sites, with automatic learning capabilities, on-the-fly

word-list creation, and form auto-completion.
Cutting-edge security logic: high quality, low false positive, differential
security checks, capable of spotting a range of subtle flaws, including blind
injection vectors.

---
Hello.
Please can anyone review skipfish package - new security scanning tool from
WebShere?

Note that current release is beta and there are some known bugs - for example
the issues with D_FORTIFY_SOURCE.

Best regards
Michal Ambroz

-- 
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.



More information about the package-review mailing list