- system() and dos()
- ! operator
- input() without 's' option
- eval() or evalc() of insufficiently sanitized user input
- evalin('base') or evalin('caller') as those could potentially be used to execute statements that are vulnerable
- evalin(symengine) or feval(symengine) that could potentially use mupad system facilities
Vulnerability Scanner for MATLAB code?
6 ビュー (過去 30 日間)
古いコメントを表示
Products like SonarQube and Veracode exist for source code analysis of vulnerabilities. However, I haven't seemed to find one that supports MATLAB. What options are there for a code scanner that can scan MATLAB?
2 件のコメント
Walter Roberson
2020 年 4 月 6 日
I do not know of any myself.
The areas that I can think of at the moment that should be checked:
I have probably missed some, not even counting the file i/o possibilities
Walter Roberson
2020 年 4 月 8 日
Oh yes, I forgot that regexp() or regexprep() can execute arbitrary commands, so you have to sanitize any input that might make it into part of a pattern.
回答 (0 件)
参考
製品
Community Treasure Hunt
Find the treasures in MATLAB Central and discover how the community can help you!
Start Hunting!