The Wayback Machine - https://web.archive.org/web/20201107125646/https://github.com/topics/sast
Skip to content
#

sast

Here are 43 public repositories matching this topic...

semgrep
mschwager
mschwager commented Nov 4, 2020

It looks like eval is a special case in our PHP parsing:

$ echo 'eval("echo foo");' | python -m semgrep --lang php --pattern 'evaz(...);' -
ran 1 rules on 1 files: 0 findings
$ echo 'eval("echo foo");' | python -m semgrep --lang php --pattern 'eval(...);' -
semgrep error: invalid pattern
  --> CLI Input:1
1 | eval(...);
  | ^^^^^^^^^

Pattern could not be parsed as a 

Static Application Security Testing (SAST) engine focused on covering the OWASP Top 10, to make source code analysis to find vulnerabilities right in the source code, focused on a agile and easy to implement software inside your DevOps pipeline. Support the following technologies: Java (Maven and Android), Kotlin (Android), Swift (iOS), .NET Full Framework, C#, and Javascript (Node.js).

  • Updated Oct 21, 2020
  • Go

Improve this page

Add a description, image, and links to the sast topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the sast topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.