Tool | Version | Checker | Description |
---|
CodeSonar | | IO.TAINT.FNAME
BADFUNC.PATH.* | Tainted Filename A collection of checks that report uses of library functions that require securely-specified path parameters. |
Compass/ROSE |
|
| Could catch violations of this rule by enforcing that any call to open() or fopen() is preceded by a canonicalization routine—that is, a call to realpath() or canonicalize_file_name() . This call will catch some false positives, as ROSE cannot tell when canonicalization is warranted. False positives can be reduced (but not eliminated) by only reporting instances of fopen() or open() where the file name string has some other processing done to it. This reflects the fact that canonicalization is only necessary for doing verification based on the file name string |
Klocwork | | SV.DLLPRELOAD.NONABSOLUTE.DLL SV.TOCTOU.FILE_ACCESS |
|
LDRA tool suite | | 85 D | Partially implemented |
Polyspace Bug Finder | Include Page |
---|
| Polyspace Bug Finder_V |
---|
| Polyspace Bug Finder_V |
---|
|
| CERT C: Rec. FIO02-C | Checks for vulnerable path manipulation (rule fully covered) |