https://bugzilla.redhat.com/show_bug.cgi?id=1856904 Bug ID: 1856904 Summary: Review Request: pwncat - TCP/UDP communication suite Product: Fedora Version: rawhide Hardware: All OS: Linux Status: NEW Component: Package Review Severity: medium Priority: medium Assignee: nobody@xxxxxxxxxxxxxxxxx Reporter: mail@xxxxxxxxxxxxxxxxxx QA Contact: extras-qa@xxxxxxxxxxxxxxxxx CC: package-review@xxxxxxxxxxxxxxxxxxxxxxx Target Milestone: --- Classification: Fedora Spec URL: https://fab.fedorapeople.org/packages/SRPMS/pwncat.spec SRPM URL: https://fab.fedorapeople.org/packages/SRPMS/pwncat-0.1.0-1.fc31.src.rpm Project URL: https://github.com/cytopia/pwncat Description: TCP/UDP communication suite for firewall and IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic. pwncat is fully scriptable with Python (PSE). Koji scratch build: https://koji.fedoraproject.org/koji/taskinfo?taskID=47206661 rpmlint output: $ rpmlint pwncat-0.1.0-1.fc31.src.rpm pwncat.src: W: spelling-error %description -l en_US scriptable -> scrip table, scrip-table, script able 1 packages and 0 specfiles checked; 0 errors, 1 warnings. $ rpmlint pwncat-0.1.0-1.fc31.noarch.rpm pwncat.noarch: W: spelling-error %description -l en_US scriptable -> scrip table, scrip-table, script able pwncat.noarch: W: no-documentation pwncat.noarch: W: no-manual-page-for-binary pwncat 1 packages and 0 specfiles checked; 0 errors, 3 warnings. Fedora Account System Username: fab -- You are receiving this mail because: You are on the CC list for the bug. You are always notified about changes to this product and component _______________________________________________ package-review mailing list -- package-review@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe send an email to package-review-leave@xxxxxxxxxxxxxxxxxxxxxxx Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-review@xxxxxxxxxxxxxxxxxxxxxxx