Metadata-Version: 2.1
Name: repelsec
Version: 0.2
Description-Content-Type: text/markdown
License-File: LICENSE
Requires-Dist: nvdlib ~=0.7.5
Requires-Dist: xmltodict ~=0.13.0
Requires-Dist: pandas ~=2.1.1
Requires-Dist: argparse ~=1.4.0
Requires-Dist: setuptools ~=69.0.2
Requires-Dist: repelsec ~=0.1
Requires-Dist: fpdf ~=1.7.2
Requires-Dist: PyPDF2 ~=3.0.1

# REPELSEC

## About the tool

A command-line tool allowing developers to find security vulnerabilities within a Java project. This is done through:

- A series of static analysis (SAST) tests that can be run against any first party code (.java, .jsp) to identify
  potential CWE vulnerabilities.
- Software composition analysis (SCA) that identifies any outdated dependencies within the pom.xml file and their
  associated
  CVE vulnerabilities.

## Installation

If your system has Python installed, open your preferred terminal and enter the following command.

`pip install repelsec`

## Usage

Open a terminal within your IDE and enter the following command.

`repelsec [parameters] path/filename`

Available parameters and their usage can be seen by entering the following command in the terminal.

`repelsec --help`

## Example

`repelsec -p -e StrongPassword123?! -o ~/Documents/Results pom.xml`
