mirror of
https://github.com/securego/gosec.git
synced 2025-11-25 22:22:17 +02:00
Migrated old test cases.
This commit is contained in:
@@ -47,22 +47,86 @@ var _ = Describe("gas rules", func() {
|
||||
})
|
||||
|
||||
Context("report correct errors for all samples", func() {
|
||||
It("should work for G101 samples", func() {
|
||||
It("should detect hardcoded credentials", func() {
|
||||
runner("G101", testutils.SampleCodeG101)
|
||||
})
|
||||
|
||||
It("should work for G102 samples", func() {
|
||||
It("should detect binding to all network interfaces", func() {
|
||||
runner("G102", testutils.SampleCodeG102)
|
||||
})
|
||||
|
||||
It("should work for G103 samples", func() {
|
||||
It("should use of unsafe block", func() {
|
||||
runner("G103", testutils.SampleCodeG103)
|
||||
})
|
||||
|
||||
It("should work for G104 samples", func() {
|
||||
It("should errors not being checked", func() {
|
||||
runner("G104", testutils.SampleCodeG104)
|
||||
})
|
||||
|
||||
It("should detect of big.Exp function", func() {
|
||||
runner("G105", testutils.SampleCodeG105)
|
||||
})
|
||||
|
||||
It("should detect sql injection via format strings", func() {
|
||||
runner("G201", testutils.SampleCodeG201)
|
||||
})
|
||||
|
||||
It("should detect sql injection via string concatenation", func() {
|
||||
runner("G202", testutils.SampleCodeG202)
|
||||
})
|
||||
|
||||
It("should detect unescaped html in templates", func() {
|
||||
runner("G203", testutils.SampleCodeG203)
|
||||
})
|
||||
|
||||
It("should detect command execution", func() {
|
||||
runner("G204", testutils.SampleCodeG204)
|
||||
})
|
||||
|
||||
It("should detect poor file permissions on mkdir", func() {
|
||||
runner("G301", testutils.SampleCodeG301)
|
||||
})
|
||||
|
||||
It("should detect poor permissions when creating or chmod a file", func() {
|
||||
runner("G302", testutils.SampleCodeG302)
|
||||
})
|
||||
|
||||
It("should detect insecure temp file creation", func() {
|
||||
runner("G303", testutils.SampleCodeG303)
|
||||
})
|
||||
|
||||
It("should detect weak crypto algorithms", func() {
|
||||
runner("G401", testutils.SampleCodeG401)
|
||||
})
|
||||
|
||||
It("should find insecure tls settings", func() {
|
||||
runner("G402", testutils.SampleCodeG402)
|
||||
})
|
||||
|
||||
It("should detect weak creation of weak rsa keys", func() {
|
||||
runner("G403", testutils.SampleCodeG403)
|
||||
})
|
||||
|
||||
It("should find non cryptographically secure random number sources", func() {
|
||||
runner("G404", testutils.SampleCodeG404)
|
||||
})
|
||||
|
||||
It("should detect blacklisted imports - MD5", func() {
|
||||
runner("G501", testutils.SampleCodeG501)
|
||||
})
|
||||
|
||||
It("should detect blacklisted imports - DES", func() {
|
||||
runner("G502", testutils.SampleCodeG502)
|
||||
})
|
||||
|
||||
It("should detect blacklisted imports - RC4", func() {
|
||||
runner("G503", testutils.SampleCodeG503)
|
||||
})
|
||||
|
||||
It("should detect blacklisted imports - CGI (httpoxy)", func() {
|
||||
runner("G504", testutils.SampleCodeG504)
|
||||
})
|
||||
|
||||
})
|
||||
|
||||
})
|
||||
|
||||
Reference in New Issue
Block a user