1
0
mirror of https://github.com/danog/psalm.git synced 2024-11-27 04:45:20 +01:00
psalm/docs/security_analysis/index.md
2020-06-19 11:56:12 -04:00

1.9 KiB
Raw Blame History

Security Analysis in Psalm

When running with --track-tainted-input Psalm wont care about regular bugs, and instead looks at how tainted input flows in the application.

Tainted input is anything that can be controlled, wholly or in part, by a user of your application. In taint analysis, tainted input is called a taint source.

Example sources:

  • $_GET[id]
  • $_POST['email']
  • $_COOKIE['token']

Taint analysis tracks how data flows from taint sources into taint sinks. Taint sinks are places you really dont want untrusted data to end up.

Example sinks:

  • <div id="section_<?= $id ?>">
  • $pdo->exec("select * from users where name='" . $name . "'")

Taint types

Psalm recognises a number of taint types by default, defined in the Psalm\Type\TaintKind class:

  • text - used for strings that could be user-controlled
  • sql - used for strings that could contain SQL
  • html - used for strings that could contain angle brackets or unquoted strings
  • shell - used for strings that could contain shell commands
  • user_secret - used for strings that could contain user-supplied secrets
  • system_secret - used for strings that could contain system secrets

You're also free to define your own taint types when defining custom taint sources they're just strings.

Taint Sources

Psalm currently defines three default taint sources: the $_GET, $_POST and $_COOKIE server variables.

You can also define your own taint sources.

Taint Sinks

Psalm currently defines a number of different for builtin functions and methods, including echo, include, header.

You can also define your own taint sinks.

Avoiding false-positives

Nobody likes to wade through a ton of false-positives heres a guide to avoiding them.