mirror of
https://github.com/securego/gosec.git
synced 2024-11-06 03:55:50 +00:00
131 lines
3.3 KiB
Go
131 lines
3.3 KiB
Go
package rules_test
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
"log"
|
|
|
|
"github.com/GoASTScanner/gas"
|
|
|
|
"github.com/GoASTScanner/gas/rules"
|
|
"github.com/GoASTScanner/gas/testutils"
|
|
. "github.com/onsi/ginkgo"
|
|
. "github.com/onsi/gomega"
|
|
)
|
|
|
|
var _ = Describe("gas rules", func() {
|
|
|
|
var (
|
|
logger *log.Logger
|
|
config gas.Config
|
|
analyzer *gas.Analyzer
|
|
runner func(string, []testutils.CodeSample)
|
|
)
|
|
|
|
BeforeEach(func() {
|
|
logger, _ = testutils.NewLogger()
|
|
config = gas.NewConfig()
|
|
analyzer = gas.NewAnalyzer(config, logger)
|
|
runner = func(rule string, samples []testutils.CodeSample) {
|
|
analyzer.LoadRules(rules.Generate(rules.NewRuleFilter(false, rule)).Builders()...)
|
|
for n, sample := range samples {
|
|
analyzer.Reset()
|
|
pkg := testutils.NewTestPackage()
|
|
defer pkg.Close()
|
|
pkg.AddFile(fmt.Sprintf("sample_%d.go", n), sample.Code)
|
|
pkg.Build()
|
|
e := analyzer.Process(pkg.Path)
|
|
Expect(e).ShouldNot(HaveOccurred())
|
|
issues, _ := analyzer.Report()
|
|
if len(issues) != sample.Errors {
|
|
fmt.Println(sample.Code)
|
|
}
|
|
Expect(issues).Should(HaveLen(sample.Errors))
|
|
}
|
|
}
|
|
})
|
|
|
|
Context("report correct errors for all samples", func() {
|
|
It("should detect hardcoded credentials", func() {
|
|
runner("G101", testutils.SampleCodeG101)
|
|
})
|
|
|
|
It("should detect binding to all network interfaces", func() {
|
|
runner("G102", testutils.SampleCodeG102)
|
|
})
|
|
|
|
It("should use of unsafe block", func() {
|
|
runner("G103", testutils.SampleCodeG103)
|
|
})
|
|
|
|
It("should errors not being checked", func() {
|
|
runner("G104", testutils.SampleCodeG104)
|
|
})
|
|
|
|
It("should detect of big.Exp function", func() {
|
|
runner("G105", testutils.SampleCodeG105)
|
|
})
|
|
|
|
It("should detect sql injection via format strings", func() {
|
|
runner("G201", testutils.SampleCodeG201)
|
|
})
|
|
|
|
It("should detect sql injection via string concatenation", func() {
|
|
runner("G202", testutils.SampleCodeG202)
|
|
})
|
|
|
|
It("should detect unescaped html in templates", func() {
|
|
runner("G203", testutils.SampleCodeG203)
|
|
})
|
|
|
|
It("should detect command execution", func() {
|
|
runner("G204", testutils.SampleCodeG204)
|
|
})
|
|
|
|
It("should detect poor file permissions on mkdir", func() {
|
|
runner("G301", testutils.SampleCodeG301)
|
|
})
|
|
|
|
It("should detect poor permissions when creating or chmod a file", func() {
|
|
runner("G302", testutils.SampleCodeG302)
|
|
})
|
|
|
|
It("should detect insecure temp file creation", func() {
|
|
runner("G303", testutils.SampleCodeG303)
|
|
})
|
|
|
|
It("should detect weak crypto algorithms", func() {
|
|
runner("G401", testutils.SampleCodeG401)
|
|
})
|
|
|
|
It("should find insecure tls settings", func() {
|
|
runner("G402", testutils.SampleCodeG402)
|
|
})
|
|
|
|
It("should detect weak creation of weak rsa keys", func() {
|
|
runner("G403", testutils.SampleCodeG403)
|
|
})
|
|
|
|
It("should find non cryptographically secure random number sources", func() {
|
|
runner("G404", testutils.SampleCodeG404)
|
|
})
|
|
|
|
It("should detect blacklisted imports - MD5", func() {
|
|
runner("G501", testutils.SampleCodeG501)
|
|
})
|
|
|
|
It("should detect blacklisted imports - DES", func() {
|
|
runner("G502", testutils.SampleCodeG502)
|
|
})
|
|
|
|
It("should detect blacklisted imports - RC4", func() {
|
|
runner("G503", testutils.SampleCodeG503)
|
|
})
|
|
|
|
It("should detect blacklisted imports - CGI (httpoxy)", func() {
|
|
runner("G504", testutils.SampleCodeG504)
|
|
})
|
|
|
|
})
|
|
|
|
})
|