Ensure hardcoded credentials only examines strings

The hardcoded credentials test should only consider assignment of const strings.

Related to issue #108
This commit is contained in:
Grant Murphy 2017-01-11 09:41:35 -08:00
parent d4f9b88cbf
commit d1e67fc995
2 changed files with 19 additions and 2 deletions

View file

@ -41,7 +41,7 @@ func (r *Credentials) matchAssign(assign *ast.AssignStmt, ctx *gas.Context) (*ga
if ident, ok := i.(*ast.Ident); ok { if ident, ok := i.(*ast.Ident); ok {
if r.pattern.MatchString(ident.Name) { if r.pattern.MatchString(ident.Name) {
for _, e := range assign.Rhs { for _, e := range assign.Rhs {
if _, ok := e.(*ast.BasicLit); ok { if rhs, ok := e.(*ast.BasicLit); ok && rhs.Kind == token.STRING {
return gas.NewIssue(ctx, assign, r.What, r.Severity, r.Confidence), nil return gas.NewIssue(ctx, assign, r.What, r.Severity, r.Confidence), nil
} }
} }
@ -63,7 +63,7 @@ func (r *Credentials) matchGenDecl(decl *ast.GenDecl, ctx *gas.Context) (*gas.Is
if len(valueSpec.Values) <= index { if len(valueSpec.Values) <= index {
index = len(valueSpec.Values) - 1 index = len(valueSpec.Values) - 1
} }
if _, ok := valueSpec.Values[index].(*ast.BasicLit); ok { if rhs, ok := valueSpec.Values[index].(*ast.BasicLit); ok && rhs.Kind == token.STRING {
return gas.NewIssue(ctx, decl, r.What, r.Severity, r.Confidence), nil return gas.NewIssue(ctx, decl, r.What, r.Severity, r.Confidence), nil
} }
} }

View file

@ -111,3 +111,20 @@ func TestHardecodedVarsNotAssigned(t *testing.T) {
}`, analyzer) }`, analyzer)
checkTestResults(t, issues, 1, "Potential hardcoded credentials") checkTestResults(t, issues, 1, "Potential hardcoded credentials")
} }
func TestHardcodedConstInteger(t *testing.T) {
config := map[string]interface{}{"ignoreNosec": false}
analyzer := gas.NewAnalyzer(config, nil)
analyzer.AddRule(NewHardcodedCredentials(config))
issues := gasTestRunner(`
package main
const (
ATNStateSomethingElse = 1,
ATNStateTokenStart = 42,
)
func main() {
println(ATNStateTokenStart)
}`, analyzer)
checkTestResults(t, issues, 0, "Potential hardcoded credentials")
}