|
Message-ID: <515401BB.7030205@op5.se> Date: Thu, 28 Mar 2013 09:39:23 +0100 From: Andreas Ericsson <ae@....se> To: oss-security@...ts.openwall.com CC: Corey Bryant <coreyb@...ux.vnet.ibm.com> Subject: Re: Security vulnerability tools On 03/27/2013 08:54 PM, Corey Bryant wrote: > Hi, > > I'd like to get a better understanding of tools used in the open source community (kernel and user space) to detect security vulnerabilities. > > I have a list below to get started. If anyone has any input, I'd appreciate it! > > I'll plan on updating http://oss-security.openwall.org/wiki/tools with anything it doesn't already have. > sparse works similarly to clang. It was hacked up by the kernel folks for finding potential errors in the linux kernel. I like it particularly because it has very few false positives, unlike most other tools I've tried. That means it's actually viable to strive for "no warnings" from it and run it as part of automated testsuites. -- Andreas Ericsson andreas.ericsson@....se OP5 AB www.op5.se Tel: +46 8-230225 Fax: +46 8-230231 Considering the successes of the wars on alcohol, poverty, drugs and terror, I think we should give some serious thought to declaring war on peace.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.