Dynamic Security Analysis
npm install @andromeda/mir-daDynamically analyze JavaScript programs to extract or enforce RWX sets.
mir-da
-h, --help: Output (this) help
-V --version: Output version information
-v, vv, vvv, --verbosity: Add (multiple) verbosity levels
-d, --depth
-e, --enforce
-r, --report
-s, --save
-p, --print [
--module-exclude : Comma-separated property names to exclude from analysis (e.g., 'Promise,toString,escape,setImmediate') : Comma-separated property names to include in the analysis (assumes prop-exclude='*') * module-locals, m: Module-local names such as 'require'
--module-include
--context-exclude
--context-include
--prop-exclude
--prop-include
Contexts
under these categories (can be included in their long or short form):
* node-globals, n: All Node.js-related globals, such as 'console' and 'process'
* es-globals, e: All EcmaScript 6 globals names such Math.sin or
* user-globals, g: User-defined globals accessed with a 'global' prefix, e.g., 'global.y = 3'
* with-globals, w: User-defined globals accessed without a prefix, e.g., 'y = 3' (expensive to track)