-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Safety-oriented static analysis tooling #22
Comments
Thanks for referencing the tools! I would like to clarify their aims and capabilities:
Prusti (project page) is a verifier that aims to support verification of functional properties such as that function
MIRAI cannot handle unsafe code, and it is unclear how to extend MIRAI to handle it. On the other hand, Viper–the back-end used by Prusti–is designed for verifying concurrent code that manually manipulates memory. Therefore, Prusti would be more suitable than MIRAI for verifying unsafe code. |
clippy is a great thing to lean on though. In addition to improving clippy's existing security/restriction lints, @Manishearth says he'll accept clippy security PRs for widely used ecosystem crates. I'd look to something like gosec for security lints which could be implemented in terms of clippy. Something I've daydreamed about is a security-oriented static analysis integration suite. Right now I think there are a lot of small tools which do one thing and do it well, but it'd be really nice if there were a way to drive several small security lint tools in unison with an uncomplicated setup process and centralized configuration. I'm thinking of something along the lines of brakeman in the security space, or gometalinter as a more general lint suite. I think it'd be particularly useful for the purposes of auditing usages of |
@Shnatsel where are you getting "clippy isn't oriented towards security analyses" from? We do multiple kinds and don't have an aversion to security analyses. |
@Manishearth frankly mostly because I've never seen it yell at me that I was doing something insecure. It might be a completely wrong impression. Is it the case that Clippy is cool with security-related lints, but doesn't have lots of them yet? Thanks for calling me out on this by the way, I'll update the post. |
It has a couple security-ish lints, and a lot of the restriction (opt in) lints are useful for security purposes, but in general security practices aren't yet crystallized for rust yet so there's not much it can do there. Like, this WG deciding on things is a prerequisite, because there's a limit to what can be linked (e.g. we can't do global analyses) so the lints have to be evolved in tandem with the crates. |
Chatted with @Bascule out of band about this. From Clippy's point of view, we're willing to add lints about popular crates (e.g. there's a limit about passing invalid regexes to the regex crate). So if there's thing that's almost unambiguously (false positives are okay, just not too many) insecure with Diesel, we can lint that. If you have a lot of false positives it can be turned into an opt-in lint. If y'all standardize on crates that help provide security boundaries (e.g. an Instead of standardizing on crates we can also standardize on attributes, e.g. |
The untrusted crate contains some wrapper types for this purpose, namely a wrapper for Not sure what @briansmith thinks of using this crate for general purpose marker types though. My understanding is due to some ergonomics issues with the wrapper types, he's moving away from using this way in ring, but perhaps he has thoughts. |
Regarding this:
What would people think of expanding It could potentially run additional static analysis tools (in parallel!), like the clippy security lints, cargo-geiger, Prusti/MIRAI , etc. |
|
Absolutely! The idea wouldn't be to duplicate these tools, but make it easy to run several of them on a single codebase (in parallel, and with a unified configuration). And yes, for clippy I think it would just shell out and collect the results via stdout, ideally in some structured format |
I feel a single tool doing everything at once would be overwhelming. It would spit out so many warnings that people would just ignore all of them. The fact that some tools have greater false positive rates than others doesn't help. That said, we do have a problem with discoverability of tooling. This is tracked as #25 |
That's what lint groups are for, clippy can turn off a bunch of these by default and your tool can turn them on wholesale easily. Like, this is a very normal problem clippy has already, and we've solved this already. You really don't want to try maintaining a separate linting library unless you can also get it to be included in the rust build process (unlikely). |
I mentioned a few "security suite" static analysis tools I've used in the past with great success: BrakemanA popular(!) security-oriented static analysis tool for Ruby/Rails, which was further developed into a commercial offering (which it seems was recently acquired). In the same way I looked to RubySec when creating RustSec, I think Brakeman serves as a successful and popular example of this sort of tool, and does pretty much what I was describing before, which is its own set of clippy-like AST-based scans, and also checking the project against the RubySec advisory database. The important features I think keep Brakeman from being overwhelming:
gometalinterGo has famously fast compile times, but to achieve that it doesn't check many program properties which could usefully prevent bugs in practice. Lots of "do one thing and do it well" tools popped up for many interesting cases (e.g. the equivalents of things like gometalinter provides a convenient way to drive multiple static analysis tools for Go projects. It lets you select which tools you want to use, manages the workflow of using them, and runs them concurrently for better performance. While not a security-oriented tool per se, I think it's another example of a successful "static analysis suite" |
I sure don't, and everyone already has clippy! I'd definitely rather lean on clippy for that sort of thing, and then just shell out to it to drive it. |
"untrusted" vs "trusted" is too simplistic. We need additional notions like "unparsed" vs "syntactically valid" vs "syntactically valid and with a claim of provenance that hasn't been verified" vs. "trusted for a given set of uses." In addition, even when a binary distinction makes sense, it is problematic to use |
Clippy is great heuristic tool, but does not have many safety or security analysis lints yet. We should extend it with anti-patterns we discover. This is tracked as
#24#27.However, there is also a need for safety-oriented sound (as opposed to heuristic) tooling. There are currently two projects working in that direction (ignoring formal proof systems that are too cumbersome to use):
Both are not usable on real-world code yet and could use some help.
The text was updated successfully, but these errors were encountered: