Smarkets HQ

Updates from the Smarkets team on our business, culture, tech and more

Follow publication

Avoiding injection with taint analysis

Ben Caller
Smarkets HQ
Published in
6 min readSep 27, 2018

--

Querying with SQL

Snippet 1: naive vulnerable code
Snippet 2: safe parametrised query

Bandit

Snippet 3: safe query with optional hard-coded filter

False Positives

Taint analysis/code flow analysis/data flow analysis

Snippet 4: taint flows from source request.args.get via email etc. to still_tainted if something propagates
File: snippet1.pyUser input at line 1, source "request.args.get(":    ~call_1 = ret_request.args.get('email')Reassigned in:    File: snippet1.py    Line 1:       email = ~call_1    Line 2:       ~call_2 = ret_'SELECT id FROM users WHERE email = '{}''.format(email)    Line 2:       query = ~call_2Reaches line 3, sink "execute("    ~call_3 = ret_db.execute(query)

Our Experience

pyt --dont-prepend-root --no-local-imports --only-unsanitised --screen -v -t /path/to/pyt_triggers.json -pr /app -r /app

Warning

Snippet 5: Line 2 of snippet 1 has been rewritten to evade Bandit

In conclusion

Resources

--

--

No responses yet

Write a response