它能够探测传递的不安全变量到不安全的函数参数。
bin/php-security-scanner scan path/to/files
它将搜索所有文件的安全问题。
Given the following code:
<?phpfunction bar() { foo($_GET['name']);}function foo($name) { mysql_query("SELECT * FROM foo WHERE name = '$name'");}?>
Running the scanner on this file will identify like 4 as an error, with the message:
Possible SQL Injection found in call to foo() argument number 1
Currently, onlymysql_queryis supported, and only in limited situations.
项目主页:http://www.open-open.com/lib/view/home/1438239170863