Lightweight Python tool that scans C projects for common memory vulnerabilities (use-after-free, buffer overflows, integer overflows) and generates evidence-backed reports and suggested patches.
- Create a virtual environment and install dependencies:
python -m venv .venv
.\.venv\Scripts\activate
python -m pip install -r requirements.txt- Run the scanner on a C project:
python -m BAT.cli scan path/to/c/project -o outputReports are generated in output/ as report.json and report.md.
- Run unit tests (if any):
python -m pytestBAT/— main packagetest_project/— example vulnerable code used for local testingoutput/— default output directory (ignored by git)
MIT. See LICENSE.