summaryrefslogtreecommitdiff
path: root/net-analyzer/wapiti/metadata.xml
diff options
context:
space:
mode:
authorV3n3RiX <venerix@redcorelinux.org>2017-10-09 18:53:29 +0100
committerV3n3RiX <venerix@redcorelinux.org>2017-10-09 18:53:29 +0100
commit4f2d7949f03e1c198bc888f2d05f421d35c57e21 (patch)
treeba5f07bf3f9d22d82e54a462313f5d244036c768 /net-analyzer/wapiti/metadata.xml
reinit the tree, so we can have metadata
Diffstat (limited to 'net-analyzer/wapiti/metadata.xml')
-rw-r--r--net-analyzer/wapiti/metadata.xml16
1 files changed, 16 insertions, 0 deletions
diff --git a/net-analyzer/wapiti/metadata.xml b/net-analyzer/wapiti/metadata.xml
new file mode 100644
index 000000000000..043a4b4f70a2
--- /dev/null
+++ b/net-analyzer/wapiti/metadata.xml
@@ -0,0 +1,16 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE pkgmetadata SYSTEM "http://www.gentoo.org/dtd/metadata.dtd">
+<pkgmetadata>
+ <maintainer type="person">
+ <email>voyageur@gentoo.org</email>
+ <name>Bernard Cafarelli</name>
+ </maintainer>
+ <longdescription>Wapiti allows you to audit the security of your web applications.
+
+It performs black-box scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data.
+
+Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable.</longdescription>
+ <upstream>
+ <remote-id type="sourceforge">wapiti</remote-id>
+ </upstream>
+</pkgmetadata>