Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <515401BB.7030205@op5.se>
Date: Thu, 28 Mar 2013 09:39:23 +0100
From: Andreas Ericsson <ae@....se>
To: oss-security@...ts.openwall.com
CC: Corey Bryant <coreyb@...ux.vnet.ibm.com>
Subject: Re: Security vulnerability tools

On 03/27/2013 08:54 PM, Corey Bryant wrote:
> Hi,
> 
> I'd like to get a better understanding of tools used in the open source community (kernel and user space) to detect security vulnerabilities.
> 
> I have a list below to get started.  If anyone has any input, I'd appreciate it!
> 
> I'll plan on updating http://oss-security.openwall.org/wiki/tools with anything it doesn't already have.
> 


sparse works similarly to clang. It was hacked up by the kernel folks
for finding potential errors in the linux kernel.

I like it particularly because it has very few false positives, unlike
most other tools I've tried. That means it's actually viable to strive
for "no warnings" from it and run it as part of automated testsuites.

-- 
Andreas Ericsson                   andreas.ericsson@....se
OP5 AB                             www.op5.se
Tel: +46 8-230225                  Fax: +46 8-230231

Considering the successes of the wars on alcohol, poverty, drugs and
terror, I think we should give some serious thought to declaring war
on peace.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.