Skip to content

Commit 25372f0

Browse files
committed
docs: include information in tutorial on download size for source code analysis
Signed-off-by: Carl Flottmann <[email protected]>
1 parent 60ad8f5 commit 25372f0

File tree

1 file changed

+2
-0
lines changed

1 file changed

+2
-0
lines changed

docs/source/pages/tutorials/detect_malicious_package.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -136,6 +136,8 @@ By default, the source code analyzer is run in conjunction with the other metada
136136
137137
./run_macaron.sh analyze -purl pkg:pypi/[email protected] --python-venv "/tmp/.django_venv" --force-analyze-source
138138
139+
.. note:: Some packages source code, like ``[email protected]``, will be larger than the default download limit of 10 megabytes. This is controlled using the ``max_download_size`` configuration under ``downloads`` in ``defaults.ini``, and can be increased by either modifying that value in ``defaults.ini`` or by passing in a configuration file using ``-dp`` with this value increased.
140+
139141
If any suspicious patterns are triggered, this will be identified in the ``mcn_detect_malicious_metadata_1`` result for the heuristic named ``suspicious_patterns``. The output database ``output/macaron.db`` can be used to get the specific results of the analysis by querying the :class:`detect_malicious_metadata_check.result field <macaron.database>`. This will provide detailed JSON information about all data collected by the ``mcn_detect_malicious_metadata_1`` check, including, for source code analysis, any malicious code patterns detected, what Semgrep rule detected it, the file in which it was detected, and the line number for the detection.
140142

141143
+++++++++++++++++++++++++++++++++++++++

0 commit comments

Comments
 (0)