This script is designed to search throughout a file for instances of code/commands that could potentially be used for malicious purposes. Since basically all Linux commands are not designed for malicious purposes, scripts that perform certain tasks, such as system administration, will be shown as possibly malicious due to potential use of sudo/su or user/group management commands.
Currently, the usage is limited to scanning for Linux commands, but there are plans to expand usage to other types of files, such as Windows batch scripts.
The basic usage is to run the script with a file as the first argument. You can also input --help as the first argument for information. If the file type you're trying to scan is listed as unsupported, but is plaintext, you can use the -f (for force) option as the 2nd argument.
Report bugs and/or suggestions, and I will see about fixing/adding them to a new version.
This script is published under the GPLv3 (https://www.gnu.org/licenses/)
Features
- Scans plaintext & BASH/SH scripts for potentially malicious commands