Bug 257589 - [NEW-PORT] devel/py-jbxapi: fully integrate Joe Sandbox into your malware analysis framework
Summary: [NEW-PORT] devel/py-jbxapi: fully integrate Joe Sandbox into your malware ana...
Status: Open
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: --- Affects Many People
Assignee: freebsd-ports-bugs (Nobody)
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2021-08-03 15:33 UTC by gettoknowmi
Modified: 2021-08-03 18:22 UTC (History)
1 user (show)

See Also:


Attachments
distfile (1.24 KB, application/x-shellscript)
2021-08-03 15:33 UTC, gettoknowmi
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description gettoknowmi 2021-08-03 15:33:18 UTC
Created attachment 226911 [details]
distfile

The Joe Sandbox API Wrapper enables you to fully integrate Joe Sandbox
into your malware analysis framework

Joe Sandbox is a deep malware analysis platform for analyzing malicious files.

WWW: https://github.com/joesecurity/jbxapi
Comment 1 Li-Wen Hsu freebsd_committer 2021-08-03 16:34:48 UTC
Some notes from first quick pass:

- How about putting this to security category (note that the subject says "devel" but what in the patch is "www"
- RUN_DEPENDS can just be `=`, no need to be `+=` on the first occurrence.