- system() and dos()
- ! operator
- input() without 's' option
- eval() or evalc() of insufficiently sanitized user input
- evalin('base') or evalin('caller') as those could potentially be used to execute statements that are vulnerable
- evalin(symengine) or feval(symengine) that could potentially use mupad system facilities
Vulnerability Scanner for MATLAB code?
5 visualizaciones (últimos 30 días)
Mostrar comentarios más antiguos
Products like SonarQube and Veracode exist for source code analysis of vulnerabilities. However, I haven't seemed to find one that supports MATLAB. What options are there for a code scanner that can scan MATLAB?
2 comentarios
Walter Roberson
el 6 de Abr. de 2020
I do not know of any myself.
The areas that I can think of at the moment that should be checked:
I have probably missed some, not even counting the file i/o possibilities
Walter Roberson
el 8 de Abr. de 2020
Oh yes, I forgot that regexp() or regexprep() can execute arbitrary commands, so you have to sanitize any input that might make it into part of a pattern.
Respuestas (0)
Ver también
Categorías
Más información sobre Embedded Coder en Help Center y File Exchange.
Productos
Community Treasure Hunt
Find the treasures in MATLAB Central and discover how the community can help you!
Start Hunting!