- system() and dos()
- ! operator
- input() without 's' option
- eval() or evalc() of insufficiently sanitized user input
- evalin('base') or evalin('caller') as those could potentially be used to execute statements that are vulnerable
- evalin(symengine) or feval(symengine) that could potentially use mupad system facilities
Vulnerability Scanner for MATLAB code?
10 visualizaciones (últimos 30 días)
Mostrar comentarios más antiguos
Products like SonarQube and Veracode exist for source code analysis of vulnerabilities. However, I haven't seemed to find one that supports MATLAB. What options are there for a code scanner that can scan MATLAB?
2 comentarios
Walter Roberson
el 6 de Abr. de 2020
I do not know of any myself.
The areas that I can think of at the moment that should be checked:
I have probably missed some, not even counting the file i/o possibilities
Walter Roberson
el 8 de Abr. de 2020
Oh yes, I forgot that regexp() or regexprep() can execute arbitrary commands, so you have to sanitize any input that might make it into part of a pattern.
Respuestas (0)
Ver también
Categorías
Más información sobre Embedded Coder en Help Center y File Exchange.
Productos
Community Treasure Hunt
Find the treasures in MATLAB Central and discover how the community can help you!
Start Hunting!