mirror of
https://github.com/securego/gosec.git
synced 2024-12-25 20:15:54 +00:00
62b5195dd9
* Report for Golang errors Right now if you use Gosec to scan invalid go file and if you report the result in a text, JSON, CSV or another file format you will always receive 0 issues. The reason for that is that Gosec can't parse the AST of invalid go files and thus will not report anything. The real problem here is that the user will never know about the issue if he generates the output in a file. Signed-off-by: Martin Vrachev <mvrachev@vmware.com>
169 lines
4.4 KiB
Go
169 lines
4.4 KiB
Go
package rules_test
|
|
|
|
import (
|
|
"fmt"
|
|
"log"
|
|
|
|
. "github.com/onsi/ginkgo"
|
|
. "github.com/onsi/gomega"
|
|
|
|
"github.com/securego/gosec"
|
|
"github.com/securego/gosec/rules"
|
|
"github.com/securego/gosec/testutils"
|
|
)
|
|
|
|
type option struct {
|
|
name gosec.GlobalOption
|
|
value string
|
|
}
|
|
|
|
var _ = Describe("gosec rules", func() {
|
|
|
|
var (
|
|
logger *log.Logger
|
|
config gosec.Config
|
|
analyzer *gosec.Analyzer
|
|
runner func(string, []testutils.CodeSample, ...option)
|
|
buildTags []string
|
|
)
|
|
|
|
BeforeEach(func() {
|
|
logger, _ = testutils.NewLogger()
|
|
config = gosec.NewConfig()
|
|
analyzer = gosec.NewAnalyzer(config, logger)
|
|
runner = func(rule string, samples []testutils.CodeSample, options ...option) {
|
|
for _, o := range options {
|
|
config.SetGlobal(o.name, o.value)
|
|
}
|
|
analyzer.LoadRules(rules.Generate(rules.NewRuleFilter(false, rule)).Builders())
|
|
for n, sample := range samples {
|
|
analyzer.Reset()
|
|
pkg := testutils.NewTestPackage()
|
|
defer pkg.Close()
|
|
for i, code := range sample.Code {
|
|
pkg.AddFile(fmt.Sprintf("sample_%d_%d.go", n, i), code)
|
|
}
|
|
err := pkg.Build()
|
|
Expect(err).ShouldNot(HaveOccurred())
|
|
err = analyzer.Process(buildTags, pkg.Path)
|
|
Expect(err).ShouldNot(HaveOccurred())
|
|
issues, _, _ := analyzer.Report()
|
|
if len(issues) != sample.Errors {
|
|
fmt.Println(sample.Code)
|
|
}
|
|
Expect(issues).Should(HaveLen(sample.Errors))
|
|
}
|
|
}
|
|
})
|
|
|
|
Context("report correct errors for all samples", func() {
|
|
It("should detect hardcoded credentials", func() {
|
|
runner("G101", testutils.SampleCodeG101)
|
|
})
|
|
|
|
It("should detect binding to all network interfaces", func() {
|
|
runner("G102", testutils.SampleCodeG102)
|
|
})
|
|
|
|
It("should use of unsafe block", func() {
|
|
runner("G103", testutils.SampleCodeG103)
|
|
})
|
|
|
|
It("should detect errors not being checked", func() {
|
|
runner("G104", testutils.SampleCodeG104)
|
|
})
|
|
|
|
It("should detect errors not being checked in audit mode", func() {
|
|
runner("G104", testutils.SampleCodeG104Audit, option{name: gosec.Audit, value: "enabled"})
|
|
})
|
|
|
|
It("should detect of big.Exp function", func() {
|
|
runner("G105", testutils.SampleCodeG105)
|
|
})
|
|
|
|
It("should detect of ssh.InsecureIgnoreHostKey function", func() {
|
|
runner("G106", testutils.SampleCodeG106)
|
|
})
|
|
|
|
It("should detect ssrf via http requests with variable url", func() {
|
|
runner("G107", testutils.SampleCodeG107)
|
|
})
|
|
|
|
It("should detect sql injection via format strings", func() {
|
|
runner("G201", testutils.SampleCodeG201)
|
|
})
|
|
|
|
It("should detect sql injection via string concatenation", func() {
|
|
runner("G202", testutils.SampleCodeG202)
|
|
})
|
|
|
|
It("should detect unescaped html in templates", func() {
|
|
runner("G203", testutils.SampleCodeG203)
|
|
})
|
|
|
|
It("should detect command execution", func() {
|
|
runner("G204", testutils.SampleCodeG204)
|
|
})
|
|
|
|
It("should detect poor file permissions on mkdir", func() {
|
|
runner("G301", testutils.SampleCodeG301)
|
|
})
|
|
|
|
It("should detect poor permissions when creating or chmod a file", func() {
|
|
runner("G302", testutils.SampleCodeG302)
|
|
})
|
|
|
|
It("should detect insecure temp file creation", func() {
|
|
runner("G303", testutils.SampleCodeG303)
|
|
})
|
|
|
|
It("should detect file path provided as taint input", func() {
|
|
runner("G304", testutils.SampleCodeG304)
|
|
})
|
|
|
|
It("should detect file path traversal when extracting zip archive", func() {
|
|
runner("G305", testutils.SampleCodeG305)
|
|
})
|
|
|
|
It("should detect weak crypto algorithms", func() {
|
|
runner("G401", testutils.SampleCodeG401)
|
|
})
|
|
|
|
It("should detect weak crypto algorithms", func() {
|
|
runner("G401", testutils.SampleCodeG401b)
|
|
})
|
|
|
|
It("should find insecure tls settings", func() {
|
|
runner("G402", testutils.SampleCodeG402)
|
|
})
|
|
|
|
It("should detect weak creation of weak rsa keys", func() {
|
|
runner("G403", testutils.SampleCodeG403)
|
|
})
|
|
|
|
It("should find non cryptographically secure random number sources", func() {
|
|
runner("G404", testutils.SampleCodeG404)
|
|
})
|
|
|
|
It("should detect blacklisted imports - MD5", func() {
|
|
runner("G501", testutils.SampleCodeG501)
|
|
})
|
|
|
|
It("should detect blacklisted imports - DES", func() {
|
|
runner("G502", testutils.SampleCodeG502)
|
|
})
|
|
|
|
It("should detect blacklisted imports - RC4", func() {
|
|
runner("G503", testutils.SampleCodeG503)
|
|
})
|
|
|
|
It("should detect blacklisted imports - CGI (httpoxy)", func() {
|
|
runner("G504", testutils.SampleCodeG504)
|
|
})
|
|
It("should detect blacklisted imports - SHA1", func() {
|
|
runner("G505", testutils.SampleCodeG505)
|
|
})
|
|
|
|
})
|
|
|
|
})
|