Skip to content
This repository has been archived by the owner on Apr 27, 2022. It is now read-only.

A pre-commit hook to find common security issues in your Python code

License

Notifications You must be signed in to change notification settings

Lucas-C/pre-commit-hooks-bandit

Repository files navigation

This hook only exists for historical reasons. It offers no benefits over the official bandir pre-commit hook, that you should use instead: PyCQA/bandit/.pre-commit-hooks.yaml

build status

A pre-commit hook to find common security issues in your Python code using bandit.

You can check the plugins list & examples for tangible use cases.

Usage

-   repo: https://github.com/Lucas-C/pre-commit-hooks-bandit
    rev: v1.0.5
    hooks:
    -   id: python-bandit-vulnerability-check

You can also specify a custom .banditrc file, specific directories to check, test IDs to skip or the alerting level :

    -   id: python-bandit-vulnerability-check
        args: [--verbose, --ini, .banditrc, -ll, --skip, "B321,B402", --recursive, src/lib]

The default arguments are defined here and indicate to check for high-severity issues in all the repo files recursively.

Note that pre-commit will pass to bandit the list of all staged files that match the files regular expression in .pre-commit-config.yaml.

If you want to execute bandit only on modified Python files, you'll need:

  • to target the Python files / directories with the files field in .pre-commit-config.yaml
  • to override the args field so it does not include --recursive
    -   id: python-bandit-vulnerability-check
        args: []
        files: .py$

Alternative local hook

You'll need to pip install bandit beforehand:

-   repo: local
    hooks:
    -   id: python-bandit-vulnerability-check
        entry: bandit
        args: [-lll, --recursive, .]
        language: system
        files: ''
        name: bandit