| 31 | You need to create a new entry under node and tell the system which diagnostics you wish to run. See the currently supported diagnostics and the IDs of them below. |
| 32 | You should have something similar in you config file: |
| 33 | |
| 34 | {{{ |
| 35 | diagnostics: |
| 36 | enabled: |
| 37 | - refactorerl |
| 38 | |
| 39 | refactorerl: |
| 40 | node: "nodeName@hostName" |
| 41 | diagnostics: |
| 42 | - "unused_macros" |
| 43 | - "unsecure_os_call" |
| 44 | }}} |
| 45 | |
| 46 | |
| 47 | == Available diagnostics == |
| 48 | |
| 49 | || '''Diagnostic ID''' || '''Diagnostic Description''' || |
| 50 | || unused_macros || Unused Macros || |
| 51 | || unsecure_interoperability || Lists interoperability related weaknesses || |
| 52 | || unsecure_concurrency || Identifies concurrency related issues || |
| 53 | || unsecure_os_call || Checks for OS injection || |
| 54 | || unsecure_port_creation || Identifies port creation related issues || |
| 55 | || unsecure_file_operation || Lists unsecure file handling || |
| 56 | || unstable_call || Shows possible atom exhaustion || |
| 57 | || nif_calls || Identifies unsecure NIF calls || |
| 58 | || unsecure_port_drivers || Lists the unsecure ddll usage || |
| 59 | || decommissioned_crypto || Lists the legacy functions from crypto module || |
| 60 | || unsecure_compile_operations || Shows unsecure compile/code loading related operations || |
| 61 | || unsecure_process_linkage || Lists unsecure process linkage || |
| 62 | || unsecure_prioritization || Identifies unsecure process prioritization || |
| 63 | || unsecure_ets_traversal || Lists unsecure ETS traversal || |
| 64 | || unsafe_network || Checks for unsecure kernel related operation || |
| 65 | || unsecure_xml_usage || Identifies unsecure xml parsing || |
| 66 | || unsecure_communication || Lists unsecure communication related settings || |