Skip to content

Commit f029fcd

Browse files
authored
Merge pull request #63 from jrfnl/feature/readme-update
README: update text
2 parents 1b8a61d + 0fc79c5 commit f029fcd

File tree

1 file changed

+53
-30
lines changed

1 file changed

+53
-30
lines changed

README.md

Lines changed: 53 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,28 @@
11
phpcs-security-audit v3
22
=======================
33

4+
<div aria-hidden="true">
5+
6+
[![Latest Stable Version](https://poser.pugx.org/pheromone/phpcs-security-audit/v/stable)](https://packagist.org/packages/pheromone/phpcs-security-audit)
7+
[![Release Date of the Latest Version](https://img.shields.io/github/release-date/FloeDesignTechnologies/phpcs-security-audit.svg?maxAge=1800)](https://github.com/FloeDesignTechnologies/phpcs-security-audit/releases)
8+
:construction:
9+
[![Latest Unstable Version](https://img.shields.io/badge/unstable-dev--master-e68718.svg?maxAge=2419200)](https://packagist.org/packages/pheromone/phpcs-security-audit#dev-master)
10+
[![Last Commit to Unstable](https://img.shields.io/github/last-commit/FloeDesignTechnologies/phpcs-security-audit/master.svg)](https://github.com/FloeDesignTechnologies/phpcs-security-audit/commits/master)
11+
12+
[![License: GPLv3](https://poser.pugx.org/pheromone/phpcs-security-audit/license)](https://github.com/FloeDesignTechnologies/phpcs-security-audit/blob/master/LICENSE)
13+
[![Minimum PHP Version](https://img.shields.io/packagist/php-v/pheromone/phpcs-security-audit.svg?maxAge=3600)](https://packagist.org/packages/pheromone/phpcs-security-audit)
14+
15+
</div>
16+
417
About
518
-----
619
phpcs-security-audit is a set of [PHP_CodeSniffer](https://github.com/squizlabs/PHP_CodeSniffer) rules that finds vulnerabilities and weaknesses related to security in PHP code.
720

821
It currently has core PHP rules as well as Drupal 7 specific rules.
922

10-
The tool also checks for CVE issues and security advisories related to the CMS/framework. This enable you to follow the versioning of components during static code analysis.
23+
The tool also checks for CVE issues and security advisories related to the CMS/framework. This enables you to follow the versioning of components during static code analysis.
1124

12-
The main reason of this project for being an extension of PHP_CodeSniffer is to have easy integration into continuous integration systems. It is also able to find security bugs that are not detected with some object oriented analysis (such as [PHPMD](http://phpmd.org/)).
25+
The main reason for this project being an extension of PHP_CodeSniffer is to have easy integration into continuous integration systems. It also allows for finding security bugs that are not detected with some object oriented analysis (such as [PHPMD](http://phpmd.org/)).
1326

1427
phpcs-security-audit in its beginning was backed by Pheromone (later on named Floe design + technologies) and written by [Jonathan Marcil](https://twitter.com/jonathanmarcil).
1528

@@ -21,43 +34,50 @@ Install
2134
Requires [PHP CodeSniffer](http://pear.php.net/package/PHP_CodeSniffer/) version 3.x with PHP 5.4 or higher.
2235

2336
The easiest way to install is using [Composer](https://getcomposer.org/):
24-
```
37+
```bash
2538
#WARNING: this currently doesn't work up until the v3 package is released
2639
#See Contribute section bellow for git clone instruction
2740
composer require --dev pheromone/phpcs-security-audit
28-
./vendor/bin/phpcs --standard=./vendor/pheromone/phpcs-security-audit/example_base_ruleset.xml ./vendor/pheromone/phpcs-security-audit/tests.php
2941
```
3042

3143
This will also install the [DealerDirect Composer PHPCS plugin](https://github.com/Dealerdirect/phpcodesniffer-composer-installer/) which will register the `Security` standard with PHP_CodeSniffer.
3244

45+
Now run:
46+
```bash
47+
./vendor/bin/phpcs -i
48+
```
49+
50+
If all went right, you should see `Security` listed in the list of installed coding standards.
51+
3352
If you want to integrate it all with Jenkins, go see http://jenkins-php.org/ for extensive help.
3453

3554

3655
Usage
3756
-----
3857

39-
Simply point to any XML ruleset file and a folder:
58+
Simply set the standard to `Security` or point to any XML ruleset file and to a folder to scan:
4059
```
4160
phpcs --extensions=php,inc,lib,module,info --standard=./vendor/pheromone/phpcs-security-audit/example_base_ruleset.xml /your/php/files/
4261
```
4362

44-
Specifying extensions is important since for example PHP code is within .module files in Drupal.
63+
Specifying extensions is important since, for example, PHP code is within `.module` files in Drupal.
4564

46-
To have a quick example of output you can use the provided tests.php file:
65+
To have a quick example of output you can use the provided `tests.php` file:
4766
```
4867
$ phpcs --extensions=php,inc,lib,module,info --standard=./vendor/pheromone/phpcs-security-audit/example_base_ruleset.xml ./vendor/pheromone/phpcs-security-audit/tests.php
4968
5069
FILE: tests.php
5170
--------------------------------------------------------------------------------
52-
FOUND 16 ERROR(S) AND 15 WARNING(S) AFFECTING 22 LINE(S)
71+
FOUND 18 ERRORS AND 36 WARNINGS AFFECTING 44 LINES
5372
--------------------------------------------------------------------------------
73+
5474
6 | WARNING | Possible XSS detected with . on echo
55-
6 | ERROR | Easy XSS detected because of direct user input with $_POST on
56-
| | echo
57-
8 | WARNING | db_query() is deprecated except when doing a static query
58-
8 | ERROR | Potential SQL injection found in db_query()
75+
6 | ERROR | Easy XSS detected because of direct user input with $_POST on echo
5976
9 | WARNING | Usage of preg_replace with /e modifier is not recommended.
60-
77+
10 | WARNING | Usage of preg_replace with /e modifier is not recommended.
78+
10 | ERROR | User input and /e modifier found in preg_replace, remote code execution possible.
79+
11 | ERROR | User input found in preg_replace, /e modifier could be used for malicious intent.
80+
...
6181
```
6282

6383
#### Drupal note
@@ -68,18 +88,21 @@ short_open_tag = On
6888
```
6989
in order to get rid of "No PHP code was found in this file" warnings.
7090

71-
Please note that only Drupal modules downloaded from drupal.org are supported. If you are using contrib module but from another source, the version checking will probably won't work and will generate warning.
91+
Please note that only Drupal modules downloaded from drupal.org are supported. If you are using contrib module but from another source, the version checking probably won't work and will generate a warning.
7292

7393

7494
Customize
7595
---------
76-
As in normal PHP CodeSniffer rules, customization is provided in the XML files that are in the top folder of the project.
96+
As with the normal PHP CodeSniffer rules, customization is provided in the XML files that are in the top folder of the project.
7797

7898
These global parameters are used in many rules:
7999
* ParanoiaMode: set to 1 to add more checks. 0 for less.
80100
* CmsFramework: set to the name of a folder containings rules and Utils.php (such as Drupal7, Symfony2).
81101

82-
They can be set in a custom ruleset `phpcs.xml[.dist]` XML file or from the command line for permanent config with `--config-set` or at runtime with `--runtime-set`. Note that the XML override all CLI options so remove it if you want to use it. The CLI usage is as follow `phpcs --runtime-set ParanoiaMode 0 --extensions=php --standard=./vendor/pheromone/phpcs-security-audit/example_base_ruleset.xml tests.php`;
102+
They can be set in a custom ruleset `phpcs.xml[.dist]` XML file or from the command line for permanent config with `--config-set` or at runtime with `--runtime-set`. Note that the XML overrides all CLI options so remove it if you want to use it. The CLI usage is as follows:
103+
```bash
104+
phpcs --runtime-set ParanoiaMode 0 --extensions=php --standard=./vendor/pheromone/phpcs-security-audit/example_base_ruleset.xml tests.php
105+
```
83106

84107
In some case you can force the paranoia mode on or off with the parameter `forceParanoia` inside the XML rule.
85108

@@ -91,8 +114,8 @@ If you want to fork and help or just do your own sniffs you can use the utilitie
91114

92115
Let's say you have a custom CMS function that is taking user input from `$_GET` when a function call to `get_param()` is done.
93116

94-
You have to create a new Folder in Sniffs/ that will be the name of your framework. Then you'll need
95-
to create a file named Utils.php that will actually be the function that will specialise the generic sniffs. To guide you, just copy the file from another folder such as Drupal7/.
117+
You have to create a new Folder in `Sniffs/` that will be the name of your framework. Then you'll need
118+
to create a file named `Utils.php` that will actually be the function that will specialise the generic sniffs. To guide you, just copy the file from another folder such as `Drupal7/`.
96119

97120
The main function you'll want to change is `is_direct_user_input` where you'll want to return TRUE when `get_param()` is seen:
98121
```php
@@ -130,30 +153,30 @@ PHP CodeSniffer Config installed_paths set to ../../../
130153

131154
If for any reason you need to change this (should work out of the box) you will need to `phpcs --config-set installed_paths` as explained in [PHP_CodeSniffer docs](https://github.com/squizlabs/PHP_CodeSniffer/wiki/Configuration-Options#setting-the-installed-standard-paths).
132155

133-
Master can contain breaking changes, so people are better to rely on releases for stable versions.
156+
Master can contain breaking changes, so people are better off relying on releases for stable versions.
134157

135158
Those release packages are available [here on GitHub](releases) or on [Packagist](https://packagist.org/packages/pheromone/phpcs-security-audit).
136159

137-
Some guidelines if you want to create new rules:
138-
* Ensure that `ParanoiaMode` controls how verbose your sniff is
139-
* If sometime the sniff is a valid security concern, run it when paranoia=true only
140-
* Warnings are generally issued instead of Errors for most-of-the-time when paranoia=false
141-
* Errors are always generated when you are use about user input being used
142-
* Prefer false positives (annoying results) over false negatives (missing results)
143-
* paranoia=false should solve false positive, otherwise warn on anything remotely suspicious
144-
* Include at least one test that trigger your sniff into `tests.php`
145-
* Keep it as a one liner, doesn't need to make sense
160+
Some guidelines if you want to create new rules::
161+
* Ensure that `ParanoiaMode` controls how verbose your sniff is:
162+
* If the sniff is only some of the time a valid security concern, run it when `paranoia=true` only.
163+
* Warnings are generally issued instead of Errors for most-of-the-time concerns when `paranoia=false`.
164+
* Errors are always generated when you are sure about user input being used.
165+
* Prefer false positives (annoying results) over false negatives (missing results).
166+
* `paranoia=false` should solve false positive, otherwise warn on anything remotely suspicious.
167+
* Include at least one test that triggers your sniff into `tests.php`.
168+
* Keep the test as a one liner, it doesn't need to make sense.
146169
* Don't forget to include your new sniff in the `example_base_ruleset.xml` and `example_drupal7_ruleset.xml` when it applies.
147170

148171

149172
Annoyances
150173
----------
151174

152-
As any security tools, this one comes with it's share of annoyance. At first a focus on finding vulnerabilities will be done, but later it is planned to have a phase where efforts will be towards reducing annoyances, in particular with the number of false positives.
175+
As with any security tool, this one comes with it's share of annoyance. At first a focus on finding vulnerabilities will be done, but later it is planned to have a phase where efforts will be towards reducing annoyances, in particular with the number of false positives.
153176

154177
* It's a generator of false positives. This can actually help you learn what are the weak functions in PHP. Paranoia mode will fix that by doing a major cut-off on warnings when set to 0.
155178
* This tool was created around 10 years ago. Some of its parts might look outdated, and support for old PHP code will still be present. The reality is that many code base scanned with it might be as old as the tool.
156-
* It's slow. On big Drupal modules and core it can take too much time (and RAM, reconfigure cli/php.ini to use 512M if needed) to run. Not sure if it's because of bugs in PHPCS or this set of rules, but will be investigated last. Meanwhile you can configure PHPCS to ignore big contrib modules (and run another instance of PHPCS for .info parsing only for them). An example is og taking hours, usually everything runs under 1-2 minutes and sometime around 5 minute. You can try using the `--parallel=8` (or another number) option to try and speed things up on supported OSes. Possible workaround is to use phpcs --ignore=folder to skip scanning of those parts.
179+
* It's slow. On big Drupal modules and core it can take too much time (and RAM, reconfigure `cli/php.ini` to use 512M if needed) to run. Not sure if it's because of bugs in PHPCS or this set of rules, but will be investigated last. Meanwhile you can configure PHPCS to ignore big contrib modules (and run another instance of PHPCS for `.info` parsing only for them). An example is og taking hours, usually everything runs under 1-2 minutes and sometimes around 5 minute. You can try using the `--parallel=8` (or another number) option to try and speed things up on supported OSes. Possible work-around is to use `phpcs --ignore=folder` to skip scanning of those parts.
157180
* For Drupal advisories checking: a module with multiple versions might be secure if a lesser fixed version exists and you'll still get the error or warning. Keep everything updated at latest as recommended on Drupal's website.
158181

159182

0 commit comments

Comments
 (0)