Implement a checker similar in usage/reporting to checksec and kconfig-hardened-check that ingests either a U-Boot .config or Depthcharge device configuration file and flags potentially risky enabled commands or configuration items.
Output options should include:
Pretty-printed tables
CSV
HTML tables
This work will undoubtedly help prioritize some additional depthcharge.Operation implementations, based on what we find to be most common across samples.
Implement a checker similar in usage/reporting to checksec and kconfig-hardened-check that ingests either a U-Boot
.config
or Depthcharge device configuration file and flags potentially risky enabled commands or configuration items.Output options should include:
This work will undoubtedly help prioritize some additional
depthcharge.Operation
implementations, based on what we find to be most common across samples.