| | 31 | You need to create a new entry under node and tell the system which diagnostics you wish to run. See the currently supported diagnostics and the IDs of them below. |
| | 32 | You should have something similar in you config file: |
| | 33 | |
| | 34 | {{{ |
| | 35 | diagnostics: |
| | 36 | enabled: |
| | 37 | - refactorerl |
| | 38 | |
| | 39 | refactorerl: |
| | 40 | node: "nodeName@hostName" |
| | 41 | diagnostics: |
| | 42 | - "unused_macros" |
| | 43 | - "unsecure_os_call" |
| | 44 | }}} |
| | 45 | |
| | 46 | |
| | 47 | == Available diagnostics == |
| | 48 | |
| | 49 | || '''Diagnostic ID''' || '''Diagnostic Description''' || |
| | 50 | || unused_macros || Unused Macros || |
| | 51 | || unsecure_interoperability || Lists interoperability related weaknesses || |
| | 52 | || unsecure_concurrency || Identifies concurrency related issues || |
| | 53 | || unsecure_os_call || Checks for OS injection || |
| | 54 | || unsecure_port_creation || Identifies port creation related issues || |
| | 55 | || unsecure_file_operation || Lists unsecure file handling || |
| | 56 | || unstable_call || Shows possible atom exhaustion || |
| | 57 | || nif_calls || Identifies unsecure NIF calls || |
| | 58 | || unsecure_port_drivers || Lists the unsecure ddll usage || |
| | 59 | || decommissioned_crypto || Lists the legacy functions from crypto module || |
| | 60 | || unsecure_compile_operations || Shows unsecure compile/code loading related operations || |
| | 61 | || unsecure_process_linkage || Lists unsecure process linkage || |
| | 62 | || unsecure_prioritization || Identifies unsecure process prioritization || |
| | 63 | || unsecure_ets_traversal || Lists unsecure ETS traversal || |
| | 64 | || unsafe_network || Checks for unsecure kernel related operation || |
| | 65 | || unsecure_xml_usage || Identifies unsecure xml parsing || |
| | 66 | || unsecure_communication || Lists unsecure communication related settings || |