The aim of this project is to study how vulnerabilities in PHP code can be detected statically by means of taint and input validation analysis.
Run analyzer.py in the project root directory. The name of the file to
analyze may be passed in as an argument. If no argument is specified, the
program will read from stdin.
Example:
./analyzer.py slices/slice1.jsonTo run the tests:
./run_testsIf you have Node.js installed, you can convert PHP into a JSON AST by doing
cd php-parser
npm install
npm run parser -- slice.phpThis will create a file slice.json with the AST.