Documentation
¶
Overview ¶
Package gosec holds the central scanning logic used by gosec security scanner
Index ¶
- Constants
- Variables
- func CLIBuildTags(buildTags []string) []string
- func ConcatString(expr ast.Expr, ctx *Context) (string, bool)
- func ContainingFile(p interface{ ... }, ctx *Context) *ast.File
- func ExcludedDirsRegExp(excludedDirs []string) []*regexp.Regexp
- func FindModuleRoot(dir string) string
- func FindVarIdentities(n *ast.BinaryExpr, c *Context) ([]*ast.Ident, bool)
- func GetBinaryExprOperands(be *ast.BinaryExpr) []ast.Node
- func GetCallInfo(n ast.Node, ctx *Context) (string, string, error)
- func GetCallObject(n ast.Node, ctx *Context) (*ast.CallExpr, types.Object)
- func GetCallStringArgsValues(n ast.Node, _ *Context) []string
- func GetChar(n ast.Node) (byte, error)
- func GetFloat(n ast.Node) (float64, error)
- func GetIdentStringValues(ident *ast.Ident) []string
- func GetIdentStringValuesRecursive(ident *ast.Ident) []string
- func GetImportPath(name string, ctx *Context) (string, bool)
- func GetImportedNames(path string, ctx *Context) (names []string, found bool)
- func GetInt(n ast.Node) (int64, error)
- func GetLocation(n ast.Node, ctx *Context) (string, int)
- func GetPkgAbsPath(pkgPath string) (string, error)
- func GetPkgRelativePath(path string) (string, error)
- func GetString(n ast.Node) (string, error)
- func GetStringRecursive(n ast.Node) (string, error)
- func Getenv(key, userDefault string) string
- func GoVersion() (int, int, int)
- func Gopath() []string
- func MatchCallByPackage(n ast.Node, c *Context, pkg string, names ...string) (*ast.CallExpr, bool)
- func MatchCompLit(n ast.Node, ctx *Context, required string) *ast.CompositeLit
- func NoSecTag(tag string) string
- func PackagePaths(root string, excludes []*regexp.Regexp) ([]string, error)
- func ParseErrors(pkg *packages.Package) (map[string][]Error, error)
- func RegexMatchWithCache(re *regexp.Regexp, s string) bool
- func RootPath(root string) (string, error)
- func TryResolve(n ast.Node, c *Context) bool
- type Analyzer
- func (gosec *Analyzer) AppendError(file string, err error)
- func (gosec *Analyzer) CheckAnalyzers(pkg *packages.Package)
- func (gosec *Analyzer) CheckAnalyzersWithSSA(pkg *packages.Package, ssaResult *buildssa.SSA)
- func (gosec *Analyzer) CheckRules(pkg *packages.Package)
- func (gosec *Analyzer) Config() Config
- func (gosec *Analyzer) LoadAnalyzers(analyzerDefinitions map[string]analyzers.AnalyzerDefinition, ...)
- func (gosec *Analyzer) LoadRules(ruleDefinitions map[string]RuleBuilder, ruleSuppressed map[string]bool)
- func (gosec *Analyzer) Process(buildTags []string, packagePaths ...string) error
- func (gosec *Analyzer) Report() ([]*issue.Issue, *Metrics, map[string][]Error)
- func (gosec *Analyzer) Reset()
- func (gosec *Analyzer) SetConfig(conf Config)
- type CallList
- func (c CallList) Add(selector, ident string)
- func (c CallList) AddAll(selector string, idents ...string)
- func (c CallList) Contains(selector, ident string) bool
- func (c CallList) ContainsCallExpr(n ast.Node, ctx *Context) *ast.CallExpr
- func (c CallList) ContainsPkgCallExpr(n ast.Node, ctx *Context, stripVendor bool) *ast.CallExpr
- func (c CallList) ContainsPointer(selector, indent string) bool
- type Config
- func (c Config) Get(section string) (interface{}, error)
- func (c Config) GetExcludeRules() ([]PathExcludeRule, error)
- func (c Config) GetGlobal(option GlobalOption) (string, error)
- func (c Config) IsGlobalEnabled(option GlobalOption) (bool, error)
- func (c Config) ReadFrom(r io.Reader) (int64, error)
- func (c Config) Set(section string, value interface{})
- func (c Config) SetExcludeRules(rules []PathExcludeRule)
- func (c Config) SetGlobal(option GlobalOption, value string)
- func (c Config) WriteTo(w io.Writer) (int64, error)
- type Context
- type Error
- type GlobalOption
- type ImportTracker
- type LRUCache
- type Metrics
- type PathExcludeRule
- type PathExclusionFilter
- type ReportInfo
- type Rule
- type RuleBuilder
- type RuleSet
Constants ¶
const ( // Globals are applicable to all rules and used for general // configuration settings for gosec. Globals = "global" // ExcludeRulesKey is the config key for path-based rule exclusions ExcludeRulesKey = "exclude-rules" )
const LoadMode = packages.NeedName | packages.NeedFiles | packages.NeedCompiledGoFiles | packages.NeedImports | packages.NeedTypes | packages.NeedTypesSizes | packages.NeedTypesInfo | packages.NeedSyntax | packages.NeedModule | packages.NeedEmbedFiles | packages.NeedEmbedPatterns
LoadMode controls the amount of details to return when loading the packages
Variables ¶
var ( ErrNoPackageTypeInfo = errors.New("package has no type information") ErrNilPackage = errors.New("nil package provided") )
var ( ErrUnexpectedASTNode = errors.New("unexpected AST node type") ErrNoProjectRelativePath = errors.New("no project relative path found") ErrNoProjectAbsolutePath = errors.New("no project absolute path found") )
var GlobalCache = NewLRUCache[any, any](1 << 16)
GlobalCache is a shared LRU cache for expensive operations. Each use case should define its own named key type to avoid collisions.
Key type requirements:
- The key type must be comparable (no slices, maps, or funcs)
- Use type definitions (type MyKey struct{...}), not type aliases (type MyKey = ...)
- Avoid anonymous structs - they collide if the structure matches
Functions ¶
func CLIBuildTags ¶ added in v2.22.11
CLIBuildTags converts a list of Go build tags into the corresponding CLI build flag (-tags=form) by trimming whitespace, removing empty entries, and joining them into a comma-separated -tags argument for use with go build commands.
func ConcatString ¶
ConcatString recursively concatenates constant strings from an expression if the entire chain is fully constant-derived (using TryResolve). Returns the concatenated string and true if successful.
func ContainingFile ¶ added in v2.23.0
ContainingFile returns the *ast.File from ctx.PkgFiles that contains the given position provider. A position provider can be an ast.Node, a types.Object, or any type with a Pos() token.Pos method. Returns nil if not found or if the provider is nil/invalid.
func ExcludedDirsRegExp ¶
ExcludedDirsRegExp builds the regexps for a list of excluded dirs provided as strings
func FindModuleRoot ¶ added in v2.24.0
FindModuleRoot returns the directory containing the go.mod file that governs the given directory. It walks upward from dir until it finds a go.mod file or reaches the filesystem root. Returns "" if no go.mod is found.
This is needed to correctly load packages in multi-module repositories: without setting packages.Config.Dir to the module root, packages.Load uses the current working directory for module resolution, which fails when the CWD belongs to a different module than the package being loaded.
func FindVarIdentities ¶
FindVarIdentities returns array of all variable identities in a given binary expression
func GetBinaryExprOperands ¶ added in v2.4.0
func GetBinaryExprOperands(be *ast.BinaryExpr) []ast.Node
GetBinaryExprOperands returns all operands of a binary expression by traversing the expression tree
func GetCallInfo ¶
GetCallInfo returns the package or type and name associated with a call expression.
func GetCallObject ¶
GetCallObject returns the object and call expression and associated object for a given AST node. nil, nil will be returned if the object cannot be resolved.
func GetCallStringArgsValues ¶
GetCallStringArgsValues returns the values of strings arguments if they can be resolved
func GetIdentStringValues ¶
GetIdentStringValues return the string values of an Ident if they can be resolved
func GetIdentStringValuesRecursive ¶ added in v2.17.0
GetIdentStringValuesRecursive returns the string of values of an Ident if they can be resolved The difference between this and GetIdentStringValues is that it will attempt to resolve the strings recursively, if it is passed a *ast.BinaryExpr. See GetStringRecursive for details
func GetImportPath ¶
GetImportPath resolves the full import path of an identifier based on the imports in the current context(including aliases).
func GetImportedNames ¶ added in v2.14.0
GetImportedNames returns the name(s)/alias(es) used for the package within the code. It ignores initialization-only imports.
func GetLocation ¶
GetLocation returns the filename and line number of an ast.Node
func GetPkgAbsPath ¶
GetPkgAbsPath returns the Go package absolute path derived from the given path
func GetPkgRelativePath ¶
GetPkgRelativePath returns the Go relative path derived form the given path
func Getenv ¶
Getenv returns the values of the environment variable, otherwise returns the default if variable is not set
func GoVersion ¶ added in v2.12.0
GoVersion returns parsed version of Go mod version and fallback to runtime version if not found.
func MatchCallByPackage ¶
MatchCallByPackage ensures that the specified package is imported, adjusts the name for any aliases and ignores cases that are initialization only imports.
Usage:
node, matched := MatchCallByPackage(n, ctx, "math/rand", "Read")
func MatchCompLit ¶
MatchCompLit will match an ast.CompositeLit based on the supplied type
func PackagePaths ¶
PackagePaths returns a slice with all packages path at given root directory
func ParseErrors ¶ added in v2.23.0
ParseErrors parses errors from the package and returns them as a map.
func RegexMatchWithCache ¶ added in v2.23.0
RegexMatchWithCache returns the result of re.MatchString(s), using GlobalCache to store previous results for improved performance on repeated lookups.
Types ¶
type Analyzer ¶
type Analyzer struct {
// contains filtered or unexported fields
}
Analyzer object is the main object of gosec. It has methods to load and analyze packages, traverse ASTs, and invoke the correct checking rules on each node as required.
func NewAnalyzer ¶
func NewAnalyzer(conf Config, tests bool, excludeGenerated bool, trackSuppressions bool, concurrency int, logger *log.Logger) *Analyzer
NewAnalyzer builds a new analyzer.
func (*Analyzer) AppendError ¶
AppendError appends an error to the file errors
func (*Analyzer) CheckAnalyzers ¶ added in v2.16.0
CheckAnalyzers runs analyzers on a given package.
func (*Analyzer) CheckAnalyzersWithSSA ¶ added in v2.23.0
CheckAnalyzersWithSSA runs analyzers on a given package using an existing SSA result.
func (*Analyzer) CheckRules ¶ added in v2.16.0
CheckRules runs analysis on the given package.
func (*Analyzer) LoadAnalyzers ¶ added in v2.21.0
func (gosec *Analyzer) LoadAnalyzers(analyzerDefinitions map[string]analyzers.AnalyzerDefinition, analyzerSuppressed map[string]bool)
LoadAnalyzers instantiates all the analyzers to be used when analyzing source packages
func (*Analyzer) LoadRules ¶
func (gosec *Analyzer) LoadRules(ruleDefinitions map[string]RuleBuilder, ruleSuppressed map[string]bool)
LoadRules instantiates all the rules to be used when analyzing source packages
func (*Analyzer) Report ¶
Report returns the current issues discovered and the metrics about the scan
type CallList ¶
type CallList map[string]set
CallList is used to check for usage of specific packages and functions.
func (CallList) Contains ¶
Contains returns true if the package and function are members of this call list.
func (CallList) ContainsCallExpr ¶
ContainsCallExpr resolves the call expression name and type, and then determines if the call exists with the call list
func (CallList) ContainsPkgCallExpr ¶
ContainsPkgCallExpr resolves the call expression name and type, and then further looks up the package path for that type. Finally, it determines if the call exists within the call list
func (CallList) ContainsPointer ¶
ContainsPointer returns true if a pointer to the selector type or the type itself is a members of this call list.
type Config ¶
type Config map[string]interface{}
Config is used to provide configuration and customization to each of the rules.
func NewConfig ¶
func NewConfig() Config
NewConfig initializes a new configuration instance. The configuration data then needs to be loaded via c.ReadFrom(strings.NewReader("config data")) or from a *os.File.
func (Config) GetExcludeRules ¶ added in v2.23.0
func (c Config) GetExcludeRules() ([]PathExcludeRule, error)
GetExcludeRules retrieves the path-based exclusion rules from the configuration. Returns nil if no exclusion rules are configured.
func (Config) GetGlobal ¶
func (c Config) GetGlobal(option GlobalOption) (string, error)
GetGlobal returns value associated with global configuration option
func (Config) IsGlobalEnabled ¶
func (c Config) IsGlobalEnabled(option GlobalOption) (bool, error)
IsGlobalEnabled checks if a global option is enabled
func (Config) ReadFrom ¶
ReadFrom implements the io.ReaderFrom interface. This should be used with io.Reader to load configuration from file or from string etc.
func (Config) SetExcludeRules ¶ added in v2.23.0
func (c Config) SetExcludeRules(rules []PathExcludeRule)
SetExcludeRules sets the path-based exclusion rules in the configuration.
func (Config) SetGlobal ¶
func (c Config) SetGlobal(option GlobalOption, value string)
SetGlobal associates a value with a global configuration option
type Context ¶
type Context struct {
FileSet *token.FileSet
Comments ast.CommentMap
Info *types.Info
Pkg *types.Package
PkgFiles []*ast.File
Root *ast.File
Imports *ImportTracker
Config Config
Ignores ignores
PassedValues map[string]any
// contains filtered or unexported fields
}
The Context is populated with data parsed from the source code as it is scanned. It is passed through to all rule functions as they are called. Rules may use this data in conjunction with the encountered AST node.
func (*Context) GetFileAtNodePos ¶ added in v2.16.0
GetFileAtNodePos returns the file at the node position in the file set available in the context.
type GlobalOption ¶
type GlobalOption string
GlobalOption defines the name of the global options
const ( // Nosec global option for #nosec directive Nosec GlobalOption = "nosec" // ShowIgnored defines whether nosec issues are counted as finding or not ShowIgnored GlobalOption = "show-ignored" // Audit global option which indicates that gosec runs in audit mode Audit GlobalOption = "audit" // NoSecAlternative global option alternative for #nosec directive NoSecAlternative GlobalOption = "#nosec" // ExcludeRules global option for some rules should not be load ExcludeRules GlobalOption = "exclude" // IncludeRules global option for should be load IncludeRules GlobalOption = "include" // SSA global option to enable go analysis framework with SSA support SSA GlobalOption = "ssa" )
type ImportTracker ¶
type ImportTracker struct {
// Imported is a map of Imported with their associated names/aliases.
Imported map[string][]string
}
ImportTracker is used to normalize the packages that have been imported by a source file. It is able to differentiate between plain imports, aliased imports and init only imports.
func NewImportTracker ¶
func NewImportTracker() *ImportTracker
NewImportTracker creates an empty Import tracker instance
func (*ImportTracker) TrackFile ¶
func (t *ImportTracker) TrackFile(file *ast.File)
TrackFile track all the imports used by the supplied file
func (*ImportTracker) TrackImport ¶
func (t *ImportTracker) TrackImport(imported *ast.ImportSpec)
TrackImport tracks imports.
func (*ImportTracker) TrackPackages ¶
func (t *ImportTracker) TrackPackages(pkgs ...*types.Package)
TrackPackages tracks all the imports used by the supplied packages
type LRUCache ¶ added in v2.23.0
type LRUCache[K comparable, V any] struct { // contains filtered or unexported fields }
LRUCache is a simple thread-safe generic LRU cache.
func NewLRUCache ¶ added in v2.23.0
func NewLRUCache[K comparable, V any](capacity int) *LRUCache[K, V]
NewLRUCache creates a new thread-safe LRU cache with the given capacity.
type Metrics ¶
type Metrics struct {
NumFiles int `json:"files"`
NumLines int `json:"lines"`
NumNosec int `json:"nosec"`
NumFound int `json:"found"`
}
Metrics used when reporting information about a scanning run.
type PathExcludeRule ¶ added in v2.23.0
type PathExcludeRule struct {
Path string `json:"path"` // Regex pattern for matching file paths
Rules []string `json:"rules"` // Rule IDs to exclude. Use "*" to exclude all rules
}
PathExcludeRule defines rules to exclude for specific file paths
func MergeExcludeRules ¶ added in v2.23.0
func MergeExcludeRules(configRules, cliRules []PathExcludeRule) []PathExcludeRule
MergeExcludeRules combines exclude rules from multiple sources (config file + CLI). CLI rules take precedence and are processed first.
func ParseCLIExcludeRules ¶ added in v2.23.0
func ParseCLIExcludeRules(input string) ([]PathExcludeRule, error)
ParseCLIExcludeRules parses the CLI format for exclude-rules. Format: "path:rule1,rule2;path2:rule3,rule4" Example: "cmd/.*:G204,G304;test/.*:G101"
type PathExclusionFilter ¶ added in v2.23.0
type PathExclusionFilter struct {
// contains filtered or unexported fields
}
PathExclusionFilter handles filtering of issues based on path and rule combinations
func NewPathExclusionFilter ¶ added in v2.23.0
func NewPathExclusionFilter(rules []PathExcludeRule) (*PathExclusionFilter, error)
NewPathExclusionFilter creates a new filter from the provided exclusion rules. Returns an error if any path regex is invalid.
func (*PathExclusionFilter) FilterIssues ¶ added in v2.23.0
FilterIssues applies path-based exclusions to a slice of issues. Returns the filtered issues and the count of excluded issues.
func (*PathExclusionFilter) ShouldExclude ¶ added in v2.23.0
func (f *PathExclusionFilter) ShouldExclude(filePath, ruleID string) bool
ShouldExclude returns true if the given issue should be excluded based on its file path and rule ID
func (*PathExclusionFilter) String ¶ added in v2.23.0
func (f *PathExclusionFilter) String() string
String returns a human-readable representation of the filter
type ReportInfo ¶ added in v2.8.0
type ReportInfo struct {
Errors map[string][]Error `json:"Golang errors"`
Issues []*issue.Issue
Stats *Metrics
GosecVersion string
}
ReportInfo this is report information
func NewReportInfo ¶ added in v2.8.0
NewReportInfo instantiate a ReportInfo
func (*ReportInfo) WithVersion ¶ added in v2.8.0
func (r *ReportInfo) WithVersion(version string) *ReportInfo
WithVersion defines the version of gosec used to generate the report
type RuleBuilder ¶
RuleBuilder is used to register a rule definition with the analyzer
type RuleSet ¶
A RuleSet contains a mapping of lists of rules to the type of AST node they should be run on and a mapping of rule ID's to whether the rule are suppressed. The analyzer will only invoke rules contained in the list associated with the type of AST node it is currently visiting.
func (RuleSet) IsRuleSuppressed ¶ added in v2.9.4
IsRuleSuppressed will return whether the rule is suppressed.
Source Files
¶
Directories
¶
| Path | Synopsis |
|---|---|
|
cmd
|
|
|
gosec
command
|
|
|
gosecutil
command
|
|
|
tlsconfig
command
|
|
|
Package goanalysis provides a standard golang.org/x/tools/go/analysis.Analyzer for gosec.
|
Package goanalysis provides a standard golang.org/x/tools/go/analysis.Analyzer for gosec. |
|
internal
|
|
|
ssautil
Package ssautil provides shared SSA analysis utilities for gosec analyzers.
|
Package ssautil provides shared SSA analysis utilities for gosec analyzers. |
|
Package taint provides a minimal taint analysis engine for gosec.
|
Package taint provides a minimal taint analysis engine for gosec. |
|
testutils/g117_samples.go
|
testutils/g117_samples.go |