From fc0ead33b5f9df484a2ece7d72d935f50a8b5cd9 Mon Sep 17 00:00:00 2001 From: JoranHonig Date: Wed, 10 Oct 2018 10:44:55 +0200 Subject: [PATCH 1/2] Add PyPI downloads badge --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 41566bac..99a91d4f 100644 --- a/README.md +++ b/README.md @@ -4,7 +4,7 @@ ![Master Build Status](https://img.shields.io/circleci/project/github/ConsenSys/mythril/master.svg) [![Waffle.io - Columns and their card count](https://badge.waffle.io/ConsenSys/mythril.svg?columns=all)](https://waffle.io/ConsenSys/mythril) [![Sonarcloud - Maintainability](https://sonarcloud.io/api/project_badges/measure?project=mythril&metric=sqale_rating)](https://sonarcloud.io/dashboard?id=mythril) - +![mythril PyPI Downloads](https://pypistats.com/badge/mythril.png) mythril Mythril OSS is the classic security analysis tool for Ethereum smart contracts. It uses concolic analysis, taint analysis and control flow checking to detect a variety of security vulnerabilities. From 850032da415d43a1e769da40b13b99be23f89395 Mon Sep 17 00:00:00 2001 From: JoranHonig Date: Wed, 10 Oct 2018 10:48:46 +0200 Subject: [PATCH 2/2] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 99a91d4f..3a57ede6 100644 --- a/README.md +++ b/README.md @@ -4,7 +4,7 @@ ![Master Build Status](https://img.shields.io/circleci/project/github/ConsenSys/mythril/master.svg) [![Waffle.io - Columns and their card count](https://badge.waffle.io/ConsenSys/mythril.svg?columns=all)](https://waffle.io/ConsenSys/mythril) [![Sonarcloud - Maintainability](https://sonarcloud.io/api/project_badges/measure?project=mythril&metric=sqale_rating)](https://sonarcloud.io/dashboard?id=mythril) -![mythril PyPI Downloads](https://pypistats.com/badge/mythril.png) +[![PyPI Statistics](https://pypistats.com/badge/mythril.svg)](https://pypistats.com/package/mythril) mythril Mythril OSS is the classic security analysis tool for Ethereum smart contracts. It uses concolic analysis, taint analysis and control flow checking to detect a variety of security vulnerabilities.