mirror of
https://github.com/securego/gosec.git
synced 2024-12-25 12:05:52 +00:00
87 lines
3.1 KiB
Go
87 lines
3.1 KiB
Go
// (c) Copyright 2016 Hewlett Packard Enterprise Development LP
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package rules
|
|
|
|
import (
|
|
"go/ast"
|
|
|
|
"github.com/GoASTScanner/gas"
|
|
)
|
|
|
|
type RuleDefinition struct {
|
|
Description string
|
|
Create func(c gas.Config) (gas.Rule, []ast.Node)
|
|
}
|
|
|
|
type RuleList map[string]RuleDefinition
|
|
|
|
type RuleFilter func(string) bool
|
|
|
|
func NewRuleFilter(action bool, ruleIDs ...string) RuleFilter {
|
|
rulelist := make(map[string]bool)
|
|
for _, rule := range ruleIDs {
|
|
rulelist[rule] = true
|
|
}
|
|
return func(rule string) bool {
|
|
if _, found := rulelist[rule]; found {
|
|
return action
|
|
}
|
|
return !action
|
|
}
|
|
}
|
|
|
|
// Generate the list of rules to use
|
|
func Generate(filters ...RuleFilter) RuleList {
|
|
rules := map[string]RuleDefinition{
|
|
// misc
|
|
"G101": RuleDefinition{"Look for hardcoded credentials", NewHardcodedCredentials},
|
|
"G102": RuleDefinition{"Bind to all interfaces", NewBindsToAllNetworkInterfaces},
|
|
"G103": RuleDefinition{"Audit the use of unsafe block", NewUsingUnsafe},
|
|
"G104": RuleDefinition{"Audit errors not checked", NewNoErrorCheck},
|
|
"G105": RuleDefinition{"Audit the use of big.Exp function", NewUsingBigExp},
|
|
|
|
// injection
|
|
"G201": RuleDefinition{"SQL query construction using format string", NewSqlStrFormat},
|
|
"G202": RuleDefinition{"SQL query construction using string concatenation", NewSqlStrConcat},
|
|
"G203": RuleDefinition{"Use of unescaped data in HTML templates", NewTemplateCheck},
|
|
"G204": RuleDefinition{"Audit use of command execution", NewSubproc},
|
|
|
|
// filesystem
|
|
"G301": RuleDefinition{"Poor file permissions used when creating a directory", NewMkdirPerms},
|
|
"G302": RuleDefinition{"Poor file permisions used when creation file or using chmod", NewFilePerms},
|
|
"G303": RuleDefinition{"Creating tempfile using a predictable path", NewBadTempFile},
|
|
|
|
// crypto
|
|
"G401": RuleDefinition{"Detect the usage of DES, RC4, or MD5", NewUsesWeakCryptography},
|
|
"G402": RuleDefinition{"Look for bad TLS connection settings", NewIntermediateTlsCheck},
|
|
"G403": RuleDefinition{"Ensure minimum RSA key length of 2048 bits", NewWeakKeyStrength},
|
|
"G404": RuleDefinition{"Insecure random number source (rand)", NewWeakRandCheck},
|
|
|
|
// blacklist
|
|
"G501": RuleDefinition{"Import blacklist: crypto/md5", NewBlacklist_crypto_md5},
|
|
"G502": RuleDefinition{"Import blacklist: crypto/des", NewBlacklist_crypto_des},
|
|
"G503": RuleDefinition{"Import blacklist: crypto/rc4", NewBlacklist_crypto_rc4},
|
|
"G504": RuleDefinition{"Import blacklist: net/http/cgi", NewBlacklist_net_http_cgi},
|
|
}
|
|
|
|
for rule := range rules {
|
|
for _, filter := range filters {
|
|
if filter(rule) {
|
|
delete(rules, rule)
|
|
}
|
|
}
|
|
}
|
|
return rules
|
|
}
|