Skip to content

Commit 6f3389d

Browse files
marek-trtiksmowton
authored andcommitted
Merge pull request diffblue#216 from trtikm/PR_02
Introducing "rules.json" file for the extended analyser.
1 parent d7831ad commit 6f3389d

File tree

1 file changed

+107
-0
lines changed
  • regression/december_demo_sprint/Sakai/APP

1 file changed

+107
-0
lines changed
Lines changed: 107 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,107 @@
1+
[
2+
{
3+
"comment": "Potentially tained data was returned from the called function.",
4+
"class": "TaintSource",
5+
"method": "get_tainted_int:()I",
6+
"result": {
7+
"location": "return_value",
8+
"taint": "<TaintSource.get_tainted_int@Integer>"
9+
}
10+
},
11+
{
12+
"comment": "Potentially tained data was returned from the tainted input stream.",
13+
"class": "TaintedInputStream",
14+
"method": "read:([BII)I",
15+
"result": {
16+
"location": "arg1",
17+
"taint": "<TaintedInputStream.read@byte[]>"
18+
}
19+
},
20+
{
21+
"comment": "Conversion of an array of potentially tainted bytes to a string.",
22+
"class": "java.lang.String",
23+
"method": "<init>:([BII)V",
24+
"input": {
25+
"location": "arg1",
26+
"taint": "<TaintedInputStream.read@byte[]>"
27+
},
28+
"result": {
29+
"location": "arg0",
30+
"taint": "<toString(TaintedInputStream.read@byte[])@String>"
31+
}
32+
},
33+
{
34+
"comment": "Appending a potentially tainted string into the StringBuilder instance. Making the builder tainted.",
35+
"class": "java.lang.StringBuilder",
36+
"method": "append:(Ljava/lang/String;)Ljava/lang/StringBuilder;",
37+
"input": {
38+
"location": "arg1",
39+
"taint": "<toString(TaintedInputStream.read@byte[])@String>"
40+
},
41+
"result": {
42+
"location": "arg0",
43+
"taint": "<StringBuilder.append(toString(TaintedInputStream.read@byte[]))@StringBuilder>"
44+
}
45+
},
46+
{
47+
"comment": "Conversion of potentially tainted data in the StringBuilder to a potentially tainted string.",
48+
"class": "java.lang.StringBuilder",
49+
"method": "toString:()Ljava/lang/String;",
50+
"input": {
51+
"location": "arg0",
52+
"taint": "<StringBuilder.append(toString(TaintedInputStream.read@byte[]))@StringBuilder>"
53+
},
54+
"result": {
55+
"location": "return_value",
56+
"taint": "<toString(TaintedInputStream.read@byte[])@String>"
57+
}
58+
},
59+
{
60+
"comment": "Inserting a potentially tainted string into a HashMap container. Making the container tainted.",
61+
"class": "java.util.HashMap",
62+
"method": "put:(Ljava/lang/Object;Ljava/lang/Object;)Ljava/lang/Object;",
63+
"input": {
64+
"location": "arg2",
65+
"taint": "<toString(TaintedInputStream.read@byte[])@String>"
66+
},
67+
"result": {
68+
"location": "arg0",
69+
"taint": "<HashMap.put(toString(TaintedInputStream.read@byte[]))@HashMap>"
70+
}
71+
},
72+
{
73+
"comment": "Retrieving a potentially tainted string from a HashMap container.",
74+
"class": "java.util.HashMap",
75+
"method": "get:(Ljava/lang/Object;)Ljava/lang/Object;",
76+
"input": {
77+
"location": "arg0",
78+
"taint": "<HashMap.put(toString(TaintedInputStream.read@byte[]))@HashMap>"
79+
},
80+
"result": {
81+
"location": "return_value",
82+
"taint": "<toString(TaintedInputStream.read@byte[])@String>"
83+
}
84+
},
85+
{
86+
"comment": "Retrieving a potentially tainted character from a potentially tainted string.",
87+
"class": "java.lang.String",
88+
"method": "charAt:(I)C",
89+
"input": {
90+
"location": "arg0",
91+
"taint": "<toString(TaintedInputStream.read@byte[])@String>"
92+
},
93+
"result": {
94+
"location": "return_value",
95+
"taint": "<charAt(toString(TaintedInputStream.read@byte[]))@Character>"
96+
}
97+
},
98+
{
99+
"comment": "Writing a potentially tainted data into the output",
100+
"class": "TaintSink",
101+
"method": "receive_taint:(C)V",
102+
"sinkTarget": {
103+
"location": "arg0",
104+
"taint": "<charAt(toString(TaintedInputStream.read@byte[]))@Character>"
105+
}
106+
}
107+
]

0 commit comments

Comments
 (0)