GolangBCN / talks

Submit your talk or propose a topic creating an Issue
Apache License 2.0
2 stars 0 forks source link

DIY Gosec: Detect complex code patterns using semantic grep #16

Open mnnle opened 4 years ago

mnnle commented 4 years ago

✅ I have read and agree the Talk standards

DIY Gosec: Detect complex code patterns using semantic grep

We’ll discuss a static analysis tool we’re developing called Semgrep and compare it to tools like gosec. Semgrep is a tool for writing security and correctness queries on source code (for Go, Python, Java, C, and JS) with a simple grep-like interface. The original author, Yoann Padioleau, worked on Semgrep’s predecessor, Coccinelle, for Linux kernel refactoring, and later developed Semgrep while at Facebook. He’s now full time at r2c.

Semgrep is open-source and comes with a registry of OWASP Top 10 security checks. It’s ideal for security researchers, product security engineers, and developers who want to find complex code patterns without extensive knowledge of ASTs or advanced program analysis concepts.

For example, with Semgrep you can:

Simply match function calls The pattern exec.Command(...) matches exec.Command() called with any arguments or across multiple lines - but not the string "exec" in comments or hard-coded strings, because it's aware of the code structure.

Find use of SSLv3 tls.Config{..., MinVersion: $TLS.VersionSSL30, ...}

Find hardcoded JWT tokens

var $X = []byte("...")
...
$TOKEN := jwt.NewWithClaims(...)
...
$Y := $TOKEN.SignedString($X)

Source code: https://github.com/returntocorp/semgrep Test in your browser: https://semgrep.live/