Versions in this module Expand all Collapse all v1 v1.0.1 Mar 9, 2023 v1.0.0 Mar 7, 2023 Changes in this version + var Config ConfigType + var DefaultAnalyzersContent []byte + var FilesFound = 0 + var SarifReport *sarif.Report + var SarifRun *sarif.Run + var ScanConfig ConfigFile + var VulnGlobalFuncs map[string][]string + var VulnGlobalVars map[string][]string + var VulnTypes map[string][]string + func CleanupModule(dir string) error + func CloneModule(dir string, url string, branch string, keyFile string, quiet bool) error + func GrabSourceCode(filename string, lineNumber int) string + func InitConfig(globals bool, sarif bool, json bool, verbose bool, debug bool, ...) + func InitSarifReporting() + func IsValidFinding(finding Finding) bool + func LoadScanConfig() + func OutputFinding(finding Finding, outputColor bool) + func OutputFindingMetadata(results []Finding, outputColor bool) + func SSAvalToHash(val *ssa.Value) uint64 + func SarifPrintReport() + func SarifRecordFinding(type_ string, message string, filename string, lineNumber int) + func StripArguments(parentFunction string) string + type Analyzer struct + Doc string + Message string + VulnCalls map[string][]string + type CGRelation struct + Fn *ssa.Function + Instr *ssa.Call + type CallGraph map[string][]CGRelation + func (cg CallGraph) AnalyzeFunction(fn *ssa.Function) + func (cg CallGraph) ResolveParam(p *ssa.Parameter) []*ssa.Value + type ConfigFile struct + Analyzers map[string]Analyzer + Sources Sources + type ConfigType struct + Debug bool + ExitCode bool + GlobalsSafe bool + OutputJSON bool + OutputPath string + OutputSarif bool + Verbose bool + YMLPath string + type Finding struct + Type string + Untrusted_Source []TaintedCode + Vulnerable_Function TaintedCode + func MakeFinding(message string, vulnerable_function TaintedCode, ...) Finding + type MapData struct + Count int + Mapped bool + Vulnerable bool + type ReturnSet = []ssa.Value + func ReturnValues(fn *ssa.Function) []ReturnSet + type Sources struct + Functions map[string][]string + OldSrcs *Sources + Types map[string][]string + Variables map[string][]string + type TaintAnalyzer struct + TaintSource []TaintedCode + func CreateTaintAnalyzer(pass *analysis.Pass, location token.Pos) TaintAnalyzer + func (ta *TaintAnalyzer) ContainsTaint(startCall *ssa.CallCommon, val *ssa.Value, cg CallGraph) bool + func (ta *TaintAnalyzer) ContainsTaintRecurse(startCall *ssa.CallCommon, val *ssa.Value, cg CallGraph, depth int, ...) bool + func (ta TaintAnalyzer) Memoize(val *ssa.Value, vulnerable bool) + type TaintedCode struct + ParentFunction string + SourceCode string + SourceFilename string + SourceLineNum int + func GenerateTaintedCode(pass *analysis.Pass, parent *ssa.Function, position token.Pos) TaintedCode