hex0punk / wally

Function callpath mapping analysis tool for Go
Mozilla Public License 2.0
28 stars 0 forks source link

Update README.md #54

Closed hex0punk closed 3 months ago

dryrunsecurity[bot] commented 3 months ago

DryRun Security Summary

The pull request updates the documentation for the Wally tool, a static analysis tool for mapping function paths in Go code, by clarifying the usage of the -f option, expanding the details on the "Filtering call path analysis" section, and updating the information on analyzing individual paths, all aimed at improving the usability and flexibility of the tool for security teams.

Expand for full summary
**Summary:** The changes in this pull request focus on updating the documentation for the Wally tool, which is a static analysis tool for mapping function paths in Go code. The key changes include clarifying that the `-f github.com/hashicorp/` option is now optional, as Wally will filter packages by the module string of each function match by default. Additionally, the section on "Filtering call path analysis" has been expanded to provide more details on the various options available for controlling the scope of the call path analysis. The changes also clarify that the `-f` option is optional when analyzing individual paths, as Wally will filter packages by the module string of each function match by default. From an application security perspective, these changes are aimed at improving the usability and flexibility of the Wally tool, which can be a valuable asset for security teams when analyzing the attack surface and fault tolerance of Go-based applications. The ability to filter the call path analysis and focus on specific functions or packages can help security engineers better understand the potential attack vectors and potential points of failure in the codebase. **Files Changed:** - `README.md`: The documentation for the Wally tool has been updated to clarify the usage of the `-f` option, expand the details on the "Filtering call path analysis" section, and update the information on analyzing individual paths.

Code Analysis

We ran 9 analyzers against 1 file and 0 analyzers had findings. 9 analyzers had no findings.

Riskiness

:green_circle: Risk threshold not exceeded.

View PR in the DryRun Dashboard.