Skip to content

Commit 7a4df9e

Browse files
committed
update
update
1 parent 3f5a81e commit 7a4df9e

File tree

1 file changed

+11
-4
lines changed

1 file changed

+11
-4
lines changed

Readme.md

Lines changed: 11 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,7 @@
77

88
2.标准库危险模块
99
os
10-
os.popen() or subprocess.Popen(), and subprocess.check_output()
11-
sys
1210
subprocess
13-
subprocess.call(user_input, shell=True) : popen, subprocess.call等
1411
commands
1512

1613
3.危险第三方库
@@ -58,6 +55,8 @@
5855

5956

6057

58+
59+
6160
### 代码审计
6261

6362
[Python安全编码和代码审计](http://xxlegend.com/2015/07/30/Python%E5%AE%89%E5%85%A8%E7%BC%96%E7%A0%81%E5%92%8C%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1/)
@@ -68,6 +67,12 @@ https://xianzhi.aliyun.com/forum/read/301.html
6867
https://xianzhi.aliyun.com/forum/read/300.html
6968
https://xianzhi.aliyun.com/forum/read/274.html
7069

70+
[Dangerous Python Functions, Part 1](https://www.kevinlondon.com/2015/07/26/dangerous-python-functions.html)
71+
72+
[Dangerous Python Functions, Part 2](https://www.kevinlondon.com/2015/08/15/dangerous-python-functions-pt2.html)
73+
74+
[Dangerous Python Functions, Part 3](https://www.kevinlondon.com/2017/01/30/dangerous-python-functions-pt3.html)
75+
7176
[廖新喜大佬的python代码审计工具](https://github.com/shengqi158/pyvulhunter)
7277

7378
[来自openstack安全团队的python代码静态审计工具](https://github.com/openstack/bandit)
@@ -162,4 +167,6 @@ https://github.com/smartFlash/pySecurity
162167

163168
[DEFENCELY CLARIFIES PYTHON OBJECT INJECTION EXPLOITATION](https://defencely.com/blog/defencely-clarifies-python-object-injection-exploitation/)
164169

165-
[OWASP Python Security Project](https://github.com/ebranca/owasp-pysec)
170+
[OWASP Python Security Project](https://github.com/ebranca/owasp-pysec)
171+
172+
[Escaping a Python sandbox with a memory corruption bug](https://hackernoon.com/python-sandbox-escape-via-a-memory-corruption-bug-19dde4d5fea5)

0 commit comments

Comments
 (0)