Skims is a CLI application that can be configured to analyze source code, web services, and other attack surfaces, and produces detailed reports with the security vulnerabilities found.
End Users are allowed to run Skims as a Free and Open Source vulnerability detection tool.
Externally the Scanner can be an alias of:
- Skims, when run by End Users.
- The combination of efforts between Skims and Integrates, when part of the Machine Plan.
Skims refers only to the CLI application.
Skims can be used by End Users as a Free and Open Source vulnerability detection tool. In other words: it can be used without authentication or manual intervention by Fluid Attacks staff.
Skims has a low rate of False Positives, meaning that it only reports vulnerabilities that have an impact.
When the existence of a vulnerability cannot be deterministically decided, Skims will favor a False Negative over a False Positive. In other words, it will prefer failing to report a vulnerability that may have a real impact over reporting a vulnerability that may have no impact.
Make sure you are in a Linux x86_64 system:
$ uname -ms
Make sure you have the following tools installed in your system:
Now you can use Skims by calling:
$ m gitlab:fluidattacks/universe@trunk /skims
Feel free to pass the --help flag to learn more about the things it can do for you.
You can run the scanner with:
$ m gitlab:fluidattacks/universe@trunk /skims scan /path/to/config.yaml
... 🚀 !!
The configuration format is explained in the Configuration guidelines.
Skims is a CLI application written in Python.
Skims' code is related to finding vulnerabilities. Therefore, the best way to understand how everything works is by reading the source code of the CLI first and then following the control flow. You'll eventually get to the different security checks Skims performs.
The vulnerability advisories used in the Source Composition Analysis (SCA) component of Skims are added, deleted, or updated, by:
- A Scheduler in the Compute component of Common, which fetches the information from public vulnerability databases, and populates the data with new information periodically.
- Manually by a Developer.
Since access to the S3 bucket is public, access logs are dumped for security reasons into the
common.loggingbucket owned by the Users component of Common.
You can right-click on the image below to open it in a new tab, or save it to your computer.
Please read the contributing page first.
Follow the steps in the Development Environment section of our documentation.
When prompted for an AWS role, choose
and when prompted for a Development Environment, pick
universe $ m . /skims
This will build and run the Skims CLI application, including the changes you've made to the source code.
There are several skims tests, for each library or finding that has been added to the module.
Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.