File tree Expand file tree Collapse file tree 1 file changed +11
-4
lines changed Expand file tree Collapse file tree 1 file changed +11
-4
lines changed Original file line number Diff line number Diff line change 7
7
8
8
2.标准库危险模块
9
9
os
10
- os.popen() or subprocess.Popen(), and subprocess.check_output()
11
- sys
12
10
subprocess
13
- subprocess.call(user_input, shell=True) : popen, subprocess.call等
14
11
commands
15
12
16
13
3.危险第三方库
58
55
59
56
60
57
58
+
59
+
61
60
### 代码审计
62
61
63
62
[ Python安全编码和代码审计] ( http://xxlegend.com/2015/07/30/Python%E5%AE%89%E5%85%A8%E7%BC%96%E7%A0%81%E5%92%8C%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1/ )
@@ -68,6 +67,12 @@ https://xianzhi.aliyun.com/forum/read/301.html
68
67
https://xianzhi.aliyun.com/forum/read/300.html
69
68
https://xianzhi.aliyun.com/forum/read/274.html
70
69
70
+ [ Dangerous Python Functions, Part 1] ( https://www.kevinlondon.com/2015/07/26/dangerous-python-functions.html )
71
+
72
+ [ Dangerous Python Functions, Part 2] ( https://www.kevinlondon.com/2015/08/15/dangerous-python-functions-pt2.html )
73
+
74
+ [ Dangerous Python Functions, Part 3] ( https://www.kevinlondon.com/2017/01/30/dangerous-python-functions-pt3.html )
75
+
71
76
[ 廖新喜大佬的python代码审计工具] ( https://github.com/shengqi158/pyvulhunter )
72
77
73
78
[ 来自openstack安全团队的python代码静态审计工具] ( https://github.com/openstack/bandit )
@@ -162,4 +167,6 @@ https://github.com/smartFlash/pySecurity
162
167
163
168
[ DEFENCELY CLARIFIES PYTHON OBJECT INJECTION EXPLOITATION] ( https://defencely.com/blog/defencely-clarifies-python-object-injection-exploitation/ )
164
169
165
- [ OWASP Python Security Project] ( https://github.com/ebranca/owasp-pysec )
170
+ [ OWASP Python Security Project] ( https://github.com/ebranca/owasp-pysec )
171
+
172
+ [ Escaping a Python sandbox with a memory corruption bug] ( https://hackernoon.com/python-sandbox-escape-via-a-memory-corruption-bug-19dde4d5fea5 )
You can’t perform that action at this time.
0 commit comments