hex0punk / wally

Function callpath mapping analysis tool for Go
Mozilla Public License 2.0
28 stars 0 forks source link

Update README.md #42

Closed hex0punk closed 4 months ago

dryrunsecurity[bot] commented 4 months ago

Hi there :wave:, @dryrunsecurity here, below is a summary of our analysis and findings.

DryRun Security Status Findings
Configured Codepaths Analyzer :white_check_mark: 0 findings
Secrets Analyzer :white_check_mark: 0 findings
IDOR Analyzer :white_check_mark: 0 findings
SQL Injection Analyzer :white_check_mark: 0 findings
Authn/Authz Analyzer :white_check_mark: 0 findings
Sensitive Files Analyzer :white_check_mark: 0 findings

[!Note] :green_circle: Risk threshold not exceeded.

Change Summary (click to expand) The following is a summary of changes in this pull request made by me, your security buddy :robot:. Note that this summary is auto-generated and not meant to be a definitive list of security issues but rather a helpful summary from a security perspective. **Summary:** The changes made in this pull request are focused on improving the documentation and usability of the Wally tool, a static analysis tool for mapping function paths in Go code. The key changes include reorganizing the document to make the flow more logical, adding a new section on visualizing call path graphs, and introducing a section on using Wally in fuzzing efforts to determine the fault tolerance of call paths. From an application security perspective, these changes are beneficial as they highlight Wally's ability to map HTTP and gRPC routes, which can be useful for understanding an application's attack surface and identifying potential entry points for attackers. Additionally, the fault tolerance analysis feature can help identify parts of the code that may be more vulnerable to crashes or panics, which could potentially lead to denial-of-service or other security issues. The visualization capabilities of Wally can also make it easier for security analysts to understand the complex call graph of an application and identify potential security risks. **Files Changed:** - `README.md`: The changes in this file are focused on improving the documentation and usability of the Wally tool. The key changes include: 1. Reorganizing the document to make the flow more logical, by moving the "Visualizing paths with wally" section to the end of the document, after the "Analyzing individual paths" section. 2. Adding a new section on "Visualizing paths with wally" that explains how Wally can launch a server to visualize the call path graphs, which is an important feature for users. 3. Adding a new section on "Using Wally in Fuzzing Efforts to Determine Fault Tolerance of Call Paths", which highlights Wally's ability to detect which call paths are tolerant to panics or application crashes, which can be useful when planning fuzzing efforts.

Powered by DryRun Security