summary refs log tree commit diff
path: root/pkgs/tools/security/xcat/default.nix
blob: 516585f891263dc5da1d12e89f11817ca914ad1f (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
{ lib
, fetchFromGitHub
, python3
}:

python3.pkgs.buildPythonApplication rec {
  pname = "xcat";
  version = "1.2.0";
  disabled = python3.pythonOlder "3.7";
  format = "pyproject";

  src = fetchFromGitHub {
    owner = "orf";
    repo = pname;
    rev = "v${version}";
    sha256 = "01r5998gdvqjdrahpk0ci27lx9yghbddlanqcspr3qp5y5930i0s";
  };

  nativeBuildInputs = with python3.pkgs; [
    poetry-core
  ];

  propagatedBuildInputs = with python3.pkgs; [
    aiodns
    aiohttp
    appdirs
    cchardet
    click
    colorama
    prompt_toolkit
    xpath-expressions
  ];

  # Project has no tests
  doCheck = false;
  pythonImportsCheck = [ "xcat" ];

  meta = with lib; {
    description = "XPath injection tool";
    longDescription = ''
      xcat is an advanced tool for exploiting XPath injection vulnerabilities,
      featuring a comprehensive set of features to read the entire file being
      queried as well as other files on the filesystem, environment variables
      and directories.
    '';
    homepage = "https://github.com/orf/xcat";
    license = with licenses; [ mit ];
    maintainers = with maintainers; [ fab ];
  };
}