injection_vulnerability_library 0.0.2 → 0.0.3

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: ef8bb5776fa4c90fe70c4e89c5450899504296f8
4
- data.tar.gz: ca86362f92bc73ae7ae2b6038a3cc9dac9c73d09
3
+ metadata.gz: b17830e0f0cf440ed188575b511dd025cb343b61
4
+ data.tar.gz: 9f0993cb334b34e72a596e24843887f8d7935cb1
5
5
  SHA512:
6
- metadata.gz: b78c9d345a0607a3325ffdacfdd6f154c4a028288011e888cdab82ca32f4a624eab2052e0c54e54066cceafc32e11b2bca6d7a2c3bd669e7d40d90fec0d26b34
7
- data.tar.gz: b9b739eef9322fffd9a9301a790feb5068f15ba381926950c14ac1678fff1b0b8e80e160ea9be9a94795cae782d1891670cce977c1d3c7206d841165f2678f1e
6
+ metadata.gz: 42e2ac7849714e68d60da1ab385e16553db8cccf1baafb9a74d0fa88988220e4ffed7a32be2985626c6e03134510cba71118e32f019d2e2999d9edfa9b14da65
7
+ data.tar.gz: b0e1506ad1dd9b4ea4b99f3a51cafbae5070abe9d9fb6c989a3860b54efec84a7ef77acdf5338cb6ba84e8e42d608f1a849c107a9206f29b3a20ad2c4ead9fa9
data/README.md CHANGED
@@ -1,4 +1,5 @@
1
1
  # Injection::Vulnerability::Library
2
+ [![Gem Version](https://badge.fury.io/rb/injection_vulnerability_library.svg)](https://badge.fury.io/rb/injection_vulnerability_library)
2
3
  [![Build Status](https://travis-ci.org/araneforseti/injection_vulnerability_library.svg?branch=master)](https://travis-ci.org/araneforseti/injection_vulnerability_library)
3
4
 
4
5
  Gem for integrating with automated tests to check for potential injection problems within codebases
@@ -8,7 +9,7 @@ Gem for integrating with automated tests to check for potential injection proble
8
9
  Add this line to your application's Gemfile:
9
10
 
10
11
  ```ruby
11
- gem 'injection-vulnerability-library'
12
+ gem 'injection_vulnerability_library'
12
13
  ```
13
14
 
14
15
  And then execute:
@@ -17,7 +18,7 @@ And then execute:
17
18
 
18
19
  Or install it yourself as:
19
20
 
20
- $ gem install injection-vulnerability-library
21
+ $ gem install injection_vulnerability_library
21
22
 
22
23
  ## Usage
23
24
 
data/changelog.txt CHANGED
@@ -1,5 +1,8 @@
1
+ 0.0.3
2
+ - Trying to fix issue with file load in order to load all the vulnerabilities
3
+
1
4
  0.0.2
2
- - Removing vulnerability which was breaking consumers
5
+ - Fixing issue for consumers with one of the vulnerabilities
3
6
 
4
7
  0.0.1
5
8
  - Add basic SQL vulnerabilities
@@ -1,3 +1,3 @@
1
1
  module InjectionVulnerabilityLibrary
2
- VERSION = "0.0.2"
2
+ VERSION = "0.0.3"
3
3
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: injection_vulnerability_library
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.0.2
4
+ version: 0.0.3
5
5
  platform: ruby
6
6
  authors:
7
7
  - arane
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2018-05-24 00:00:00.000000000 Z
11
+ date: 2018-05-25 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bundler