For the source code security review, we listed common source code patterns of critical security issues and also risky APIs. Based on these security source patterns, we also introduced some open source tools to search these security issues.
Secure code review
What are common secure code review patterns and risky APIs?
The following table lists common keywords and patterns for secure code review:
Programming language |
Risky API or the insecure code patterns |
False positive |
|
General |
Weak encryption |
Blowfish | DES | 3DES | RC4 | MD5 | SHA1 | XOR | ARC4 | IDEA | ECB | CBC | TLS 1.0 | SSL 2.0 | Base64 | RIPEMD |
Low |
Insecure protocol |
SSL | HTTP | FTP | Telnet |
Low |
|
Hard-coded info. |
Password | IP address... |