Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up

Find authentication (authn) and authorization (authz) security bugs in web application routes.

License

NotificationsYou must be signed in to change notification settings

mschwager/route-detect

Repository files navigation

CIPython VersionsPyPI Version

Find authentication (authn) and authorization (authz) security bugs in web application routes:

Important

The Semgrep functionalityroute-detect depends on to display code snippets has been moved behind their cloud app. For more information see#10762. However, earlier versions of Semgrep still support this behavior. When usingroute-detect, make sure to install a version of Semgrep before1.97.0. This can be accomplished with the following command:python -m pip install 'semgrep<1.97.0'.

Routes demo

Routes fromkoel streaming server

Web application HTTP route authn and authz bugs are some of the most common security issues found today. These industry standard resources highlight the severity of the issue:

Supported web frameworks (route-detect IDs in parentheses):

  • Python: Django (django,django-rest-framework), Flask (flask), Sanic (sanic), FastAPI (fastapi)
  • PHP: Laravel (laravel), Symfony (symfony), CakePHP (cakephp)
  • Ruby: Rails* (rails), Grape (grape)
  • Java: JAX-RS (jax-rs), Spring (spring)
  • Go: Gorilla (gorilla), Gin (gin), Chi (chi)
  • JavaScript/TypeScript: Express (express), React (react), Angular (angular)

*Rails support is limited. Please seethis issue for more information.

Installing

Usepip to installroute-detect:

$ python -m pip install --upgrade route-detect

You can check thatroute-detect is installed correctly with the following command:

$ echo 'print(1 == 1)' | semgrep --config $(routes which test-route-detect) -Scanning 1 file.Findings:  /tmp/stdin     routes.rules.test-route-detect        Found '1 == 1', your route-detect installation is working correctly          1┆ print(1 == 1)Ran 1 rule on 1 file: 1 finding.

Using

route-detect provides theroutes CLI command and usessemgrep to search for routes.

Use thewhich subcommand to pointsemgrep at the correct web application rules:

$ semgrep --config $(routes which django) path/to/django/code

Use theviz subcommand to visualize route information in your browser:

$ semgrep --json --config $(routes which django) --output routes.json path/to/django/code$ routes viz --browser routes.json

If you're not sure which framework to look for, you can use the specialall ID to check everything:

$ semgrep --json --config $(routes which all) --output routes.json path/to/code

If you have custom authn or authz logic, you can copyroute-detect's rules:

$ cp $(routes which django) my-django.yml

Then you can modify the rule as necessary and run it like above:

$ semgrep --json --config my-django.yml --output routes.json path/to/django/code$ routes viz --browser routes.json

Contributing

route-detect usespoetry for dependency and configuration management.

Before proceeding, install project dependencies with the following command:

$ poetry install --with dev

Linting

Lint all project files with the following command:

$ poetry run pre-commit run --all-files

Testing

Run Python tests with the following command:

$ poetry run pytest --cov

Run Semgrep rule tests with the following command:

$ poetry run semgrep --test --config routes/rules/ tests/test_rules/

About

Find authentication (authn) and authorization (authz) security bugs in web application routes.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

[8]ページ先頭

©2009-2025 Movatter.jp