wasc-satec@lists.webappsec.org

WASC Static Analysis Tool Evaluation Criteria

View all threads

RE : Looking for more reviewers

PA
Philippe Arteau
Tue, Aug 14, 2012 1:24 AM

Hi all,
I recently discovered the project SATEC. I would like to proposed few
modifications to the document.

Expanding "Tool Coverage" (section 3)
Few sub-sections should be added.

(include simply for distinction with the following)

  • Language support : Ability to point line of code. Ability to
    trace variables flows, method calls and implicit dependencies when needed.
  • Framework : Support for the frameworks used. Ability to recognize
    the Authentication framework use.
  • Library and API : Ability to recognize the API used for database access,
    access to file system, etc.
  • Internal API : Ability to expand the tool to integrate custom API created
    internally by the company. (Similar to section 4.3)

(3.4 -"... Understand components" could be reformulate to Configurations)

Product Update Process * (section 7)*
On my first read, I thought the section 7 (which end up in section 4 on the
first draft) was not appropriate to the Code analysis context .
Static code analysis is very different from malware analysis. Every new
binaries in malware analysis is likely to have been
packed/obfuscated differently.
In development, the framework and languages used do not evolve rapidly.

From time to time, libraries are introduce to support new functionalities.

But there are no 0 day API. ;)

I'm not trying to demolish the previous work. I think the criteria list was
pretty complete.

That's it .. I hope I'll be able to collaborate on the project.

===
Just for transparency: I have started a weekend project called
Find-Security-Bugs http://h3xstream.github.com/find-sec-bugs/. The tool
doesn't have an ultra advanced detection engine. My goal is not to make
this small project more visible through this document.

--
Philippe Arteau

Hi all, I recently discovered the project SATEC. I would like to proposed few modifications to the document. *Expanding "Tool Coverage" (section 3)* Few sub-sections should be added. (include simply for distinction with the following) - Language support : Ability to point line of code. Ability to trace variables flows, method calls and implicit dependencies when needed. + Framework : Support for the frameworks used. Ability to recognize the Authentication framework use. + Library and API : Ability to recognize the API used for database access, access to file system, etc. + Internal API : Ability to expand the tool to integrate custom API created internally by the company. (Similar to section 4.3) (3.4 -"... Understand components" could be reformulate to Configurations) *Product Update Process* * (section 7)* On my first read, I thought the section 7 (which end up in section 4 on the first draft) was not appropriate to the Code analysis context . Static code analysis is very different from malware analysis. Every new binaries in malware analysis is likely to have been packed/obfuscated differently. In development, the framework and languages used do not evolve rapidly. >From time to time, libraries are introduce to support new functionalities. But there are no 0 day API. ;) I'm not trying to demolish the previous work. I think the criteria list was pretty complete. That's it .. I hope I'll be able to collaborate on the project. === Just for transparency: I have started a weekend project called Find-Security-Bugs <http://h3xstream.github.com/find-sec-bugs/>. The tool doesn't have an ultra advanced detection engine. My goal is _not_ to make this small project more visible through this document. === -- Philippe Arteau
PA
Philippe Arteau
Tue, Aug 21, 2012 3:20 AM

Hi,

The second draft actually include few things I mentions (Framework and
rename to Configuration). At first, I did not red the proper document.
http://projects.webappsec.org/w/page/42093482/Static%20Analysis%20Tool%20Evaluation%20Criteria%20Working

Nonetheless, I think library should be mentions.

  • Library correspond to precise api vulnerabilities : potential injection,
    hard code password, static iv, etc.
  • While Framework related vulnerability would be associate to exception
    being exposed (oracle padding attack), lack of authentication,
    misconfigurations, etc. Framework integration might be able to detect
    linked vulnerabilities and identify higher risk.

Any thought about the necessity for signature update ?

--
Philippe Arteau

Hi, The second draft actually include few things I mentions (Framework and rename to Configuration). At first, I did not red the proper document. http://projects.webappsec.org/w/page/42093482/Static%20Analysis%20Tool%20Evaluation%20Criteria%20Working Nonetheless, I think library should be mentions. - Library correspond to precise api vulnerabilities : potential injection, hard code password, static iv, etc. - While Framework related vulnerability would be associate to exception being exposed (oracle padding attack), lack of authentication, misconfigurations, etc. Framework integration might be able to detect linked vulnerabilities and identify higher risk. Any thought about the necessity for signature update ? -- Philippe Arteau