- system() and dos()
- ! operator
- input() without 's' option
- eval() or evalc() of insufficiently sanitized user input
- evalin('base') or evalin('caller') as those could potentially be used to execute statements that are vulnerable
- evalin(symengine) or feval(symengine) that could potentially use mupad system facilities
Vulnerability Scanner for MATLAB code?
10 ビュー (過去 30 日間)
古いコメントを表示
Products like SonarQube and Veracode exist for source code analysis of vulnerabilities. However, I haven't seemed to find one that supports MATLAB. What options are there for a code scanner that can scan MATLAB?
2 件のコメント
Walter Roberson
2020 年 4 月 6 日
I do not know of any myself.
The areas that I can think of at the moment that should be checked:
I have probably missed some, not even counting the file i/o possibilities
Walter Roberson
2020 年 4 月 8 日
Oh yes, I forgot that regexp() or regexprep() can execute arbitrary commands, so you have to sanitize any input that might make it into part of a pattern.
回答 (0 件)
参考
カテゴリ
Help Center および File Exchange で MATLAB Compiler についてさらに検索
製品
Community Treasure Hunt
Find the treasures in MATLAB Central and discover how the community can help you!
Start Hunting!