rapid7/metasploit-framework

View on GitHub
lib/msf/core/payload/java.rb

Summary

Maintainability
A
2 hrs
Test Coverage

Method generate_war has 34 lines of code (exceeds 25 allowed). Consider refactoring.
Open

  def generate_war(opts={})
    raise if not respond_to? :stager_config
    zip = Rex::Zip::Jar.new

    web_xml = %q{<?xml version="1.0"?>
Severity: Minor
Found in lib/msf/core/payload/java.rb - About 1 hr to fix

    Method generate_axis2 has 26 lines of code (exceeds 25 allowed). Consider refactoring.
    Open

      def generate_axis2(opts={})
        raise if not respond_to? :stager_config
    
        app_name = opts[:app_name] || Rex::Text.rand_text_alpha_lower(rand(8)+8)
    
    
    Severity: Minor
    Found in lib/msf/core/payload/java.rb - About 1 hr to fix

      There are no issues that match your filters.

      Category
      Status