-
Notifications
You must be signed in to change notification settings - Fork 2
Add cds utils modelling #206
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
and test for model
Good work! I'd like to suggest some changes that aren't tied to specific locations, so I'm instead putting them here: Organization of APIs & nomenclatureI first thought of mirroring what was done in the standard library, to first organize then into
But this won't do justice to some of the APIs like
and not extending any of the standard library classes from Why make it more fine-grained?The APIs in the DirectoryReaders, FileReaders, and FileReaderWriters category are not sinks themselves, rather they are taint propagators in that the data read from these functions are tainted given the dependencies of the function calls are tainted. The real vulnerability happens when these data hit a side-effecting function like ones that send an HTTP response (for a close analogy, see Location of Sources / Sinks / FlowStepsThese are better suited for query libraries as what counts as one of these three depend on the type of the vulnerability. So, I suggest making a Suggestions on Sink Categorization
Suggested future work
...which are borrowed from So I suggest adding |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Left first comment above.
Sorry, please disregard the section |
What This PR Contributes
This PR overall contributes models for the cds.utils CAP module, the implementation of which can be found here and the documentation here. Specifically the model is comprised of :
Future Works
The next step of this work will be to include a query that uses CAP specific sources and these sinks to describe the specific potential path traversal vulnerability that could occur through this API