Skip to content

Commit d61cfd5

Browse files
authored
Merge pull request #55 from hvalkerie19/patch-7
Add Sobelow Example to CI/CD Module
2 parents 6167f16 + e518b03 commit d61cfd5

File tree

1 file changed

+31
-0
lines changed

1 file changed

+31
-0
lines changed

modules/8-cicd.livemd

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,37 @@ This module will cover over some of the automated processes you may see in a CI/
3131

3232
Built in Elixir, for Elixir, by NCC Group - this tool will try to determine whether your codebase has a number of web vulnerabilities as well as the insecurites outlined in [Module 5 - Elixir Security](./5-elixir.livemd).
3333

34+
### <span style="color:blue;">Example</span>
35+
Install [Sobelow](https://sobelow.io/) and add it to your application dependicies or install it by following the instructions https://hexdocs.pm/sobelow/readme.html
36+
37+
Scan your project by running the following at a terminal in your project's root directory
38+
```
39+
$ mix sobelow
40+
```
41+
As a vulnerability scanner, there are multiple categories of vulnerabilities sobelow is capable of discovering and reporting on.
42+
43+
For instance, there are a number of security issues published on the Common Weakness Enumeration (CWE) site - [CWE's](https://cwe.mitre.org/top25/archive/2022/2022_cwe_top25.html) and on OWASP Top 10 [OWASP Top 10](https://owasp.org/www-project-top-ten/).
44+
45+
Scanning tools like Sobelow identify code patterns that match these issues and report them back to developers/users.
46+
47+
### <span style="color:blue;">Example</span>
48+
49+
Let's say you are interested finding in places in your application that may be susceptible to injection attacks.
50+
51+
There are several types of injection. Referring to the CWE list, we see #17 CWE-77 for Command Injection, #25 CWE-94 is Code Injection, and #3 CWE-89 is SQL Injection. If we look at the OWASP Top 10 for 2021, A03:2021-Injection is third on the list. Sobelow has the capability to detect these types of security issues.
52+
53+
Injection vulnerabilities are places in an application where a malicious actor can send commands, queries, and other input that gets processed and executed as code. Injection attacks can trigger the application into performing an unauthorized action or exposing sensitive data.
54+
55+
[The following modules are supported by Sobelow for the discovery of Command Injection Vulnerabilities](https://hexdocs.pm/sobelow/0.2.4/Sobelow.CI.html#content)
56+
57+
```
58+
Sobelow.CI
59+
Sobelow.CI.OS
60+
Sobelow.CI.System
61+
```
62+
63+
Reference: https://docs.guardrails.io/docs/vulnerabilities/elixir/insecure_use_of_dangerous_function
64+
3465
### Usage
3566

3667
Refer to Sobelow's [README](https://github.com/nccgroup/sobelow#installation) for the simplest instructions on how to use it.

0 commit comments

Comments
 (0)