| 注册
请输入搜索内容

热门搜索

Java Linux MySQL PHP JavaScript Hibernate jQuery Nginx
jopen
9年前发布

PHP静态安全扫描器:php-security-scanner

它能够探测传递的不安全变量到不安全的函数参数。

用法:

bin/php-security-scanner scan path/to/files

它将搜索所有文件的安全问题。

示例

Given the following code:

<?php    function bar() {      foo($_GET['name']);  }    function foo($name) {      mysql_query("SELECT * FROM foo WHERE name = '$name'");  }    ?>

Running the scanner on this file will identify like 4 as an error, with the message:

Possible SQL Injection found in call to foo() argument number 1

Supported vulnerability scanners:

Currently, onlymysql_queryis supported, and only in limited situations.


项目主页:http://www.open-open.com/lib/view/home/1438239170863

 本文由用户 jopen 自行上传分享,仅供网友学习交流。所有权归原作者,若您的权利被侵害,请联系管理员。
 转载本站原创文章,请注明出处,并保留原始链接、图片水印。
 本站是一个以用户分享为主的开源技术平台,欢迎各类分享!
 本文地址:https://www.open-open.com/lib/view/open1438239170863.html
PHP开发 php-security-scanner