Security Analysis of Python Code Using Bandit: A Streamlit-Based Git Repository Scanner

Saved in:
Bibliographic Details
Title: Security Analysis of Python Code Using Bandit: A Streamlit-Based Git Repository Scanner
Authors: Deeksha D R, Prajna M R, SAVITHA C K, Ujwal U J
Source: International Journal of Computer Science and Mobile Computing. 14:12-14
Publisher Information: Zain Publications, 2025.
Publication Year: 2025
Description: The growing reliance on open-source software has increased the likelihood of security flaws making their way into production systems. Detecting such issues during development is crucial to reducing risks and improving software quality. This study introduces a Python-based security scanner that brings together the static analysis tool Bandit with an interactive Streamlit dashboard. The proposed tool automatically clones repositories with GitPython, prepares a clean workspace with Shutil, and then executes Bandit scans using the Subprocess module. The findings are presented through visual reports, allowing developers to easily review detected weaknesses and prioritize fixes. The approach is designed to be lightweight and accessible, offering developers a straightforward way to integrate security checks into their workflows while paving the way for further extensions such as multi-repository analysis and advanced vulnerability classification.
Document Type: Article
ISSN: 2320-088X
DOI: 10.47760/ijcsmc.2025.v14i09.002
Accession Number: edsair.doi...........bbf0f7a76582be60b7597e11e37b2a93
Database: OpenAIRE
Description
Abstract:The growing reliance on open-source software has increased the likelihood of security flaws making their way into production systems. Detecting such issues during development is crucial to reducing risks and improving software quality. This study introduces a Python-based security scanner that brings together the static analysis tool Bandit with an interactive Streamlit dashboard. The proposed tool automatically clones repositories with GitPython, prepares a clean workspace with Shutil, and then executes Bandit scans using the Subprocess module. The findings are presented through visual reports, allowing developers to easily review detected weaknesses and prioritize fixes. The approach is designed to be lightweight and accessible, offering developers a straightforward way to integrate security checks into their workflows while paving the way for further extensions such as multi-repository analysis and advanced vulnerability classification.
ISSN:2320088X
DOI:10.47760/ijcsmc.2025.v14i09.002