Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Feature] Security Tests #1

Open
6 tasks
bararchy opened this issue Sep 13, 2018 · 4 comments
Open
6 tasks

[Feature] Security Tests #1

bararchy opened this issue Sep 13, 2018 · 4 comments

Comments

@bararchy
Copy link

It would be really nice to add some security tests and checks to ameba.

  • Check for old and insecure hashing algorithms (MD5, etc..)
  • Check for unsanitized DB insertion queries (SQL Injections)
  • Check for XSS attacks by unsanitized user input rendered in HTML content
  • Check for unsafe memory allocation (bufferoverflow, etc..)
  • Check for bad manual SSL Cipher configurations (EXP::MD5::RC4 , etc..)
  • Check for bad manual SSL protocol usage (SSLv3, TLS1)

Take a look at Microsoft DevSkim and take some logic and ideas.

Take a look at Breakman and take some logic and ideas.

@veelenga veelenga transferred this issue from crystal-ameba/ameba Apr 12, 2020
@veelenga
Copy link
Member

Since security tests give a lot of false positiveness, I think it is reasonable to create an external extension for these kinds of tests.

@kimburgess
Copy link

@veelenga are there any references or documentation for putting together such an extension? Current tooling for Crystal-Lang looks to be very light in this area. This looks like a great spot to start solving this.

@veelenga
Copy link
Member

Docs are here:

https://crystal-ameba.github.io/2019/07/22/how-to-write-extension

I appreciate any help on this. Let me know if you would like to give it a try, i can create a repo and basic extension skeleton.

@kimburgess
Copy link

Nice writeup! There's enough info there to get started.

I can't make any commitments around time that I can spend on this, but will start exploring.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants