From 89e85ab4f41a1841430aef8a839e9c827855abbb Mon Sep 17 00:00:00 2001 From: zinwang Date: Wed, 20 Nov 2024 16:17:21 +0800 Subject: [PATCH] Update python version to 3.10 in CI --- .github/workflows/testQuarkScript.yml | 24 +++++++----------------- CWE-312/CWE-312.py | 4 ++-- CWE-312/README.md | 4 ++-- 3 files changed, 11 insertions(+), 21 deletions(-) diff --git a/.github/workflows/testQuarkScript.yml b/.github/workflows/testQuarkScript.yml index be8135e..c97a567 100644 --- a/.github/workflows/testQuarkScript.yml +++ b/.github/workflows/testQuarkScript.yml @@ -20,10 +20,10 @@ jobs: git clone https://github.com/quark-engine/quark-engine.git - - name: Set up Python 3.9 + - name: Set up Python 3.10 uses: actions/setup-python@v4 with: - python-version: 3.9 + python-version: "3.10" cache: pip cache-dependency-path: quark-engine/setup.py @@ -31,22 +31,12 @@ jobs: - name: Install dependencies run: | python -m pip install --upgrade pip - python -m pip install pytest rzpipe meson==0.62.0 ninja coverage ciphey frida objection - # Install graphviz & ninja - sudo apt-get -y install graphviz ninja-build + python -m pip install frida objection importlib_resources + # Install graphviz + sudo apt-get -y install graphviz - # Install Rizin - - sudo git clone --branch v0.3.4 https://github.com/rizinorg/rizin /opt/rizin/ - cd /opt/rizin/ - meson build - ninja -C build - sudo ninja -C build install - sudo ldconfig -v - cd - - - # Install click >= 8.0.0 for CLI supports - python -m pip install click==8.0.3 + # Install click <=8.1.7 for CLI supports + python -m pip install "click<=8.1.7" - name: Install Quark-Engine run: | diff --git a/CWE-312/CWE-312.py b/CWE-312/CWE-312.py index a151adb..45be3af 100644 --- a/CWE-312/CWE-312.py +++ b/CWE-312/CWE-312.py @@ -1,5 +1,5 @@ from quark.script.frida import runFridaHook -from quark.script.ciphey import checkClearText +from quark.script.ares import checkClearText APP_PACKAGE_NAME = "oversecured.ovaa" @@ -23,4 +23,4 @@ print( "The CWE-312 vulnerability is found. " f'The cleartext is "{secondParam}"' - ) \ No newline at end of file + ) diff --git a/CWE-312/README.md b/CWE-312/README.md index 32aa88a..534b7fa 100644 --- a/CWE-312/README.md +++ b/CWE-312/README.md @@ -28,12 +28,12 @@ vulnerability. First, we designed a [Frida](https://frida.re) script `agent.js` to hook the target method and get the arguments when the target method is called. Then we hook the method `putString` to catch its arguments. -Finally, we use [Ciphey](https://github.com/Ciphey/Ciphey) to check if +Finally, we use [Ares](https://github.com/bee-san/Ares) to check if the arguments are encrypted. ``` python from quark.script.frida import runFridaHook -from quark.script.ciphey import checkClearText +from quark.script.ares import checkClearText APP_PACKAGE_NAME = "oversecured.ovaa"