Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support Vulnerability Reachability Analysis to Reduce False Positive #94

Open
abhisek opened this issue Jun 6, 2023 · 0 comments
Open
Labels
enhancement New feature or request research

Comments

@abhisek
Copy link
Member

abhisek commented Jun 6, 2023

How do you know if a vulnerability in method-X in library-Y is actually reachable from your application and therefore has a real impact and not just another noise generated by scanning tools

This is a real problem for most SCA tools because of how they operate based on version matching algorithms. Implementing reachability analysis will greatly reduce false positives related to vulnerability detection. However, doing this, especially in a language agnostic manner is challenging, if not impossible.

We should explore this problem in two stages:

  1. Define a model for performing vulnerability reachability analysis based on OSV database specific information (symbols)
  2. Implement language specific parsing and analysis infrastructure to identify control flow paths

Doing [2] is not easy as it requires having source code of all 3rd party dependencies as well to identify paths that are reachable indirectly from the target application.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request research
Projects
None yet
Development

No branches or pull requests

1 participant