[pyflakes]
apt = pyflakes
files = *.py
types = text/x-python
command = pyflakes {files}

[pyflakes3]
apt = pyflakes3 | pyflakes (<< 1.1.0-1)
files = *.py
types = text/x-python
command = pyflakes3 {files}

[pep8]
flags = style
apt = pep8
files = *.py
types = text/x-python
command = pep8 --ignore W191 {files}

[site-packages]
command = grep -rw site-packages .

[pythonpath]
command = grep -rw PYTHONPATH .

[environ-home]
files = *.py
types = text/x-python
command = grep 'environ *\[.HOME.\]' {files}

[yaml-load]
files = *.py
types = text/x-python
comment = These calls are potentially vulnerable to Python code injection
command = grep -F 'yaml.load' {files}

[pylint]
apt = pylint
files = *.py
command = pylint --rcfile=/dev/null --msg-template='{{path}}:{{line}}:{{column}}: [{{category}}:{{symbol}}] {{obj}}: {{msg}}' --reports=n {files}

[pylint3]
apt = pylint3
files = *.py
command = pylint3 --rcfile=/dev/null --msg-template='{{path}}:{{line}}:{{column}}: [{{category}}:{{symbol}}] {{obj}}: {{msg}}' --reports=n {files}

# TODO: hacking
# TODO: flake8
# TODO: pep257
# TODO: pylint-django
# TODO: frosted
# TODO: pychecker
# TODO: twistedchecker
# TODO: pymetrics
# TODO: dodgy
# TODO: mypy
# TODO: prospector #781165
# TODO: pyroma #734121
# TODO: pylama #779449
# TODO: dodgy #788206
# TODO: vulture #788222
# TODO: bandit #793007
# TODO: python-debtcollector
# TODO: python-afl #792317
# TODO: pycodestyle #816496
# TODO: pydocstyle #816498
# TODO: python3-requirements-detector
# TODO: https://github.com/jlachowski/clonedigger
# TODO: https://github.com/rubik/xenon
# TODO: https://gcc-python-plugin.readthedocs.io/en/latest/cpychecker.html
# TODO: http://jwilk.net/software/pydiatra
# TODO: shell metacharacter injection: subprocess shell=True os.system os.popen popen2 commands
# TODO: https://github.com/google/pytype

# vim:ft=dosini
