Provided by: rats_2.3-1_amd64 bug

NAME

       rats - Rough Auditing Tool for Security

SYNOPSIS

       rats [options] [file]...

DESCRIPTION

       rats  is a rough auditing tool for security developed by Secure Software, Inc.  It is a tool for scanning
       C, Perl, PHP, and Python source code and flagging common security  related  programming  errors  such  as
       buffer  overflows and TOCTOU (Time Of Check, Time Of Use) race conditions.  As its name implies, the tool
       performs only a rough analysis of source code.  It will not find every error and will  also  find  things
       that  are  not  errors.   Manual  inspection of your code is still necessary, but greatly aided with this
       tool.

       When started, RATS will scan each file or each file in the directory specified on the  command  line  and
       produce a report when scanning is complete.  What vulnerabilities are reported in the final report depend
       on  the  data contained in the vulnerability database or databases that are used and the warning level in
       use.

       For each vulnerability, the list of files and line numbers where it occured is given, followed by a brief
       description of the vulnerability and suggested action.

OPTIONS

       -h, --help
              Displays a brief usage summary and exit.

       -a <fun>
              Report any occurence of function 'fun' in the source file(s)

       -d <filename>, --database <filename>, --db <filename>
              Specifies a vulnerability database to be loaded.  You  may  have  multiple  -d  options  and  each
              database specified will be loaded.

       -i, --input
              Causes  a  list of function calls that were used which accept external input to be produced at the
              end of the vulnerability report.

       -l <lang>, --language <language>
              Force the specified language to  be  used  regardless  of  filename  extension.   Currently  valid
              language names are "c", "perl", "php" and "python".

       -r, --references
              Causes  references  to vulnerable function calls that are not being used as calls themselves to be
              reported.

       -w <level>, --warning <level>
              Sets the warning level. Valid levels are 1, 2 or 3.

              1 includes only default and high severity.

              2 includes medium severity (default).

              3 includes low severity vulnerabilities.

       -x     Causes the default  vulnerability  databases  (which  are  in  the  installation  data  directory,
              /usr/share/rats by default) to not be loaded.

       -R, --no-recurssion
              Do not recurse subdirectories when encountered.

       --xml  Output in XML

       --html Output in HTML

       --follow-symlinks
              Follow  symlinks  and  treat  them like whatever they are pointing to.  If the symlink points to a
              directory it will be descended into unless -R is specified, if a pointing to a file,  it  will  be
              treated as a file.

AUTHOR

       This  manual  page  was orginally written by Adam Lazur <adam@lazur.org>, for the Debian GNU/Linux system
       (but may be used by others).

       Modified by Secure Software, Inc.

                                               September 17, 2001                                        RATS(1)