Linux Security
    Linux Security
    Linux Security

    Two Open Source Security Code Scanners

    Date
    5758
    Posted By
    David Wheeler, author of the Secure Programming HOWTO and the RATS development team from Secure Software Solutions today announced open source source code security flaw scanners. "RATS scans through code, finding potentially dangerous function calls. . . .
    David Wheeler, author of the Secure Programming HOWTO and the RATS development team from Secure Software Solutions today announced open source source code security flaw scanners. "RATS scans through code, finding potentially dangerous function calls. The goal of this tool is not to definitively find bugs. Instead, this tool aims to provide a reasonable starting point for performing manual security audits." "Flawfinder" states it will "scan source code and identify out potential security flaws, ranking them by likely severity."

    Both teams mentioned they will be joining forces to produce a single GPLd 'best of breed' source code scanner.

    Currently only capable of scanning C/C++ code, "Flawfinder will miss some security problems, and point out issues that aren't really security problems, but nevertheless I think it can help track down security problems in code so that the code can be fixed."

    "Flawfinder is in its very early stages - I'm labelling it version "0.12". It works reliably, but its ruleset is currently small and rudimentary. It can already find some security problems now, but expanding its ruleset will give it much more power."

    Rough Auditing Tool for Security, the code analysis effort by SSS, looks also to be promising. "The initial vulnerability database is taken directly from things that could be easily found when starting with the forthcoming book, "Building Secure Software" by Viega and McGraw.

    We plan on actively maintaining RATS. We welcome any feedback, bug reports or contributions. Particularly, we would like to incorporate any vulnerability information people contribute. However, we will need to determine that information is public knowledge before we can incorporate it into the release.

    Feedback will be useful as we work on new versions of the tool. In the future, we plan on enhancing the tool with better analysis Additionally, we plan on extending the tool to handle other programming languages. We'd appreciate feedback on which languages are most important to people.

    The developers can be reached at: [email protected]"

    Further information on flawfinder can be found at https://www.dwheeler.com/flawfinder/ The Rough Auditing Tool for Security homepage is at https://www.securesw.com/rats/.

    Our feature story interview with David Wheeler some time ago on source code auditing, his background, and more in Linux Security Interview with David A. Wheeler

    Advisories

    LinuxSecurity Poll

    How are you contributing to Open Source?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /main-polls/37-how-are-you-contributing-to-open-source?task=poll.vote&format=json
    37
    radio
    [{"id":"127","title":"I'm involved with the development of an open-source project(s).","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"128","title":"I've reported vulnerabilities I've discovered in open-source code.","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"129","title":"I've provided developers with feedback on their projects.","votes":"0","type":"x","order":"3","pct":0,"resources":[]},{"id":"130","title":"I've helped another community member get started contributing to Open Source.","votes":"0","type":"x","order":"4","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.