%global _empty_manifest_terminate_build 0 Name: python-blint Version: 1.0.27 Release: 1 Summary: Linter for binary files powered by lief License: Apache-2.0 URL: https://git.sr.ht/~prabhu/blint Source0: https://mirrors.nju.edu.cn/pypi/web/packages/22/86/e7044144d1719b17ed2309c192046ee574b543ff4ec21178c8bad124264d/blint-1.0.27.tar.gz BuildArch: noarch Requires: python3-lief Requires: python3-rich Requires: python3-PyYAML Requires: python3-defusedxml %description # BLint ![blint logo](blint.png) BLint is a Binary Linter to check the security properties, and capabilities in your executables. It is powered by [lief](https://github.com/lief-project/LIEF) [![BLint Demo](https://asciinema.org/a/438138.png)](https://asciinema.org/a/438138) Supported binary formats: - ELF (GNU, musl) - PE (exe, dll) - Mach-O (x64, arm64) You can run blint on Linux, Windows and Mac against any of these binary formats. ## Motivation Nowadays, vendors distribute statically linked binaries produced by golang or rust or dotnet tooling. Users are used to running antivirus and anti-malware scans while using these binaries in their local devices. Blint augments these scans by listing the technical capabilities of a binary. For example, whether the binary could use network connections, or can perform file system operations and so on. The binary is first parsed using lief framework to identify the various properties such as functions, static, and dynamic symbols present. Thanks to YAML based [annotations](./blint/data/annotations) data, this information could be matched against capabilities and presented visually using a rich table. NOTE: The presence of capabilities doesn't imply that the operations are always performed by the binary. Use the output of this tool to get an idea about a binary. Also, this tool is not suitable to review malware and other heavily obfuscated binaries for obvious reasons. ## Use cases - Add blint to CI/CD to inspect the final binaries to ensure code signing or authenticode is applied correctly - Identify interesting functions and symbols for fuzzing - Blint was used at [ShiftLeft](https://shiftleft.io) to review the statically linked packages and optimize the distributed cli binary - Quickly identify malicious binaries by looking at their capabilities (Ability to manipulate networks or drivers or kernels etc) ## Installation - Install python 3.8 or above ```bash pip3 install blint ``` ### Single binary releases You can download single binary builds from the [blint-bin releases](https://github.com/AppThreat/blint/releases). These executables should work with requiring python to be installed. The macOS .pkg file is signed with a valid developer account. ## Usage ```bash usage: blint [-h] [-i SRC_DIR_IMAGE] [-o REPORTS_DIR] [--no-error] [--no-banner] [--no-reviews] Linting tool for binary files powered by lief. optional arguments: -h, --help show this help message and exit -i SRC_DIR_IMAGE, --src SRC_DIR_IMAGE Source directory or container image or binary file -o REPORTS_DIR, --reports REPORTS_DIR Reports directory --no-error Continue on error to prevent build from breaking --no-banner Do not display banner --no-reviews Do not perform method reviews --suggest-fuzzable Suggest functions and symbols for fuzzing based on a dictionary ``` To test any binary including default commands ```bash blint -i /bin/netstat -o /tmp/blint ``` Use -i to check any other binary. For eg: to check ngrok ```bash blint -i ~/ngrok -o /tmp/blint ``` Pass `--suggest-fuzzable` to get suggestions for fuzzing. A dictionary containing "common verbs" is used to identify these functions. ```bash blint -i ~/ngrok -o /tmp/blint --suggest-fuzzable ``` PowerShell example ![PowerShell](./docs/blint-powershell.jpg) ## Reports Blint produces the following json artifacts in the reports directory: - blint-output.html - HTML output from the console logs - exename-metadata.json - Raw metadata about the parsed binary. Includes symbols, functions, and signature information - findings.json - Contains information from the security properties audit. Useful for CI/CD based integration - reviews.json - Contains information from the capability reviews. Useful for further analysis - fuzzables.json - Contains a suggested list of methods for fuzzing ## References - [lief examples](https://github.com/lief-project/LIEF/tree/master/examples/python) - [checksec](https://github.com/Wenzel/checksec.py) ## Discord support The developers could be reached via the [discord](https://discord.gg/DCNxzaeUpd) channel. %package -n python3-blint Summary: Linter for binary files powered by lief Provides: python-blint BuildRequires: python3-devel BuildRequires: python3-setuptools BuildRequires: python3-pip %description -n python3-blint # BLint ![blint logo](blint.png) BLint is a Binary Linter to check the security properties, and capabilities in your executables. It is powered by [lief](https://github.com/lief-project/LIEF) [![BLint Demo](https://asciinema.org/a/438138.png)](https://asciinema.org/a/438138) Supported binary formats: - ELF (GNU, musl) - PE (exe, dll) - Mach-O (x64, arm64) You can run blint on Linux, Windows and Mac against any of these binary formats. ## Motivation Nowadays, vendors distribute statically linked binaries produced by golang or rust or dotnet tooling. Users are used to running antivirus and anti-malware scans while using these binaries in their local devices. Blint augments these scans by listing the technical capabilities of a binary. For example, whether the binary could use network connections, or can perform file system operations and so on. The binary is first parsed using lief framework to identify the various properties such as functions, static, and dynamic symbols present. Thanks to YAML based [annotations](./blint/data/annotations) data, this information could be matched against capabilities and presented visually using a rich table. NOTE: The presence of capabilities doesn't imply that the operations are always performed by the binary. Use the output of this tool to get an idea about a binary. Also, this tool is not suitable to review malware and other heavily obfuscated binaries for obvious reasons. ## Use cases - Add blint to CI/CD to inspect the final binaries to ensure code signing or authenticode is applied correctly - Identify interesting functions and symbols for fuzzing - Blint was used at [ShiftLeft](https://shiftleft.io) to review the statically linked packages and optimize the distributed cli binary - Quickly identify malicious binaries by looking at their capabilities (Ability to manipulate networks or drivers or kernels etc) ## Installation - Install python 3.8 or above ```bash pip3 install blint ``` ### Single binary releases You can download single binary builds from the [blint-bin releases](https://github.com/AppThreat/blint/releases). These executables should work with requiring python to be installed. The macOS .pkg file is signed with a valid developer account. ## Usage ```bash usage: blint [-h] [-i SRC_DIR_IMAGE] [-o REPORTS_DIR] [--no-error] [--no-banner] [--no-reviews] Linting tool for binary files powered by lief. optional arguments: -h, --help show this help message and exit -i SRC_DIR_IMAGE, --src SRC_DIR_IMAGE Source directory or container image or binary file -o REPORTS_DIR, --reports REPORTS_DIR Reports directory --no-error Continue on error to prevent build from breaking --no-banner Do not display banner --no-reviews Do not perform method reviews --suggest-fuzzable Suggest functions and symbols for fuzzing based on a dictionary ``` To test any binary including default commands ```bash blint -i /bin/netstat -o /tmp/blint ``` Use -i to check any other binary. For eg: to check ngrok ```bash blint -i ~/ngrok -o /tmp/blint ``` Pass `--suggest-fuzzable` to get suggestions for fuzzing. A dictionary containing "common verbs" is used to identify these functions. ```bash blint -i ~/ngrok -o /tmp/blint --suggest-fuzzable ``` PowerShell example ![PowerShell](./docs/blint-powershell.jpg) ## Reports Blint produces the following json artifacts in the reports directory: - blint-output.html - HTML output from the console logs - exename-metadata.json - Raw metadata about the parsed binary. Includes symbols, functions, and signature information - findings.json - Contains information from the security properties audit. Useful for CI/CD based integration - reviews.json - Contains information from the capability reviews. Useful for further analysis - fuzzables.json - Contains a suggested list of methods for fuzzing ## References - [lief examples](https://github.com/lief-project/LIEF/tree/master/examples/python) - [checksec](https://github.com/Wenzel/checksec.py) ## Discord support The developers could be reached via the [discord](https://discord.gg/DCNxzaeUpd) channel. %package help Summary: Development documents and examples for blint Provides: python3-blint-doc %description help # BLint ![blint logo](blint.png) BLint is a Binary Linter to check the security properties, and capabilities in your executables. It is powered by [lief](https://github.com/lief-project/LIEF) [![BLint Demo](https://asciinema.org/a/438138.png)](https://asciinema.org/a/438138) Supported binary formats: - ELF (GNU, musl) - PE (exe, dll) - Mach-O (x64, arm64) You can run blint on Linux, Windows and Mac against any of these binary formats. ## Motivation Nowadays, vendors distribute statically linked binaries produced by golang or rust or dotnet tooling. Users are used to running antivirus and anti-malware scans while using these binaries in their local devices. Blint augments these scans by listing the technical capabilities of a binary. For example, whether the binary could use network connections, or can perform file system operations and so on. The binary is first parsed using lief framework to identify the various properties such as functions, static, and dynamic symbols present. Thanks to YAML based [annotations](./blint/data/annotations) data, this information could be matched against capabilities and presented visually using a rich table. NOTE: The presence of capabilities doesn't imply that the operations are always performed by the binary. Use the output of this tool to get an idea about a binary. Also, this tool is not suitable to review malware and other heavily obfuscated binaries for obvious reasons. ## Use cases - Add blint to CI/CD to inspect the final binaries to ensure code signing or authenticode is applied correctly - Identify interesting functions and symbols for fuzzing - Blint was used at [ShiftLeft](https://shiftleft.io) to review the statically linked packages and optimize the distributed cli binary - Quickly identify malicious binaries by looking at their capabilities (Ability to manipulate networks or drivers or kernels etc) ## Installation - Install python 3.8 or above ```bash pip3 install blint ``` ### Single binary releases You can download single binary builds from the [blint-bin releases](https://github.com/AppThreat/blint/releases). These executables should work with requiring python to be installed. The macOS .pkg file is signed with a valid developer account. ## Usage ```bash usage: blint [-h] [-i SRC_DIR_IMAGE] [-o REPORTS_DIR] [--no-error] [--no-banner] [--no-reviews] Linting tool for binary files powered by lief. optional arguments: -h, --help show this help message and exit -i SRC_DIR_IMAGE, --src SRC_DIR_IMAGE Source directory or container image or binary file -o REPORTS_DIR, --reports REPORTS_DIR Reports directory --no-error Continue on error to prevent build from breaking --no-banner Do not display banner --no-reviews Do not perform method reviews --suggest-fuzzable Suggest functions and symbols for fuzzing based on a dictionary ``` To test any binary including default commands ```bash blint -i /bin/netstat -o /tmp/blint ``` Use -i to check any other binary. For eg: to check ngrok ```bash blint -i ~/ngrok -o /tmp/blint ``` Pass `--suggest-fuzzable` to get suggestions for fuzzing. A dictionary containing "common verbs" is used to identify these functions. ```bash blint -i ~/ngrok -o /tmp/blint --suggest-fuzzable ``` PowerShell example ![PowerShell](./docs/blint-powershell.jpg) ## Reports Blint produces the following json artifacts in the reports directory: - blint-output.html - HTML output from the console logs - exename-metadata.json - Raw metadata about the parsed binary. Includes symbols, functions, and signature information - findings.json - Contains information from the security properties audit. Useful for CI/CD based integration - reviews.json - Contains information from the capability reviews. Useful for further analysis - fuzzables.json - Contains a suggested list of methods for fuzzing ## References - [lief examples](https://github.com/lief-project/LIEF/tree/master/examples/python) - [checksec](https://github.com/Wenzel/checksec.py) ## Discord support The developers could be reached via the [discord](https://discord.gg/DCNxzaeUpd) channel. %prep %autosetup -n blint-1.0.27 %build %py3_build %install %py3_install install -d -m755 %{buildroot}/%{_pkgdocdir} if [ -d doc ]; then cp -arf doc %{buildroot}/%{_pkgdocdir}; fi if [ -d docs ]; then cp -arf docs %{buildroot}/%{_pkgdocdir}; fi if [ -d example ]; then cp -arf example %{buildroot}/%{_pkgdocdir}; fi if [ -d examples ]; then cp -arf examples %{buildroot}/%{_pkgdocdir}; fi pushd %{buildroot} if [ -d usr/lib ]; then find usr/lib -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi if [ -d usr/lib64 ]; then find usr/lib64 -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi if [ -d usr/bin ]; then find usr/bin -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi if [ -d usr/sbin ]; then find usr/sbin -type f -printf "\"/%h/%f\"\n" >> filelist.lst fi touch doclist.lst if [ -d usr/share/man ]; then find usr/share/man -type f -printf "\"/%h/%f.gz\"\n" >> doclist.lst fi popd mv %{buildroot}/filelist.lst . mv %{buildroot}/doclist.lst . %files -n python3-blint -f filelist.lst %dir %{python3_sitelib}/* %files help -f doclist.lst %{_docdir}/* %changelog * Thu Jun 08 2023 Python_Bot - 1.0.27-1 - Package Spec generated