Document how to find all patterns that do NOT have a CWE mapping.

This commit is contained in:
David A. Wheeler 2014-08-02 22:05:23 -04:00
parent 16ac21ca1f
commit 4159de084a
1 changed files with 6 additions and 4 deletions

View File

@ -857,8 +857,8 @@ the pattern in ``file1''.
If file1 contained ``CWE-120|CWE-126'' it If file1 contained ``CWE-120|CWE-126'' it
would only report hits matching those CWEs. would only report hits matching those CWEs.
.PP .PP
A list of all A list of all CWE security elements
CWE security elements (the signatures/patterns that flawfinder looks for) (the signatures/patterns that flawfinder looks for)
can be found by using the ``\-\-listrules'' option. can be found by using the ``\-\-listrules'' option.
Each line lists the signature token (typically a function name) Each line lists the signature token (typically a function name)
that may lead to a hit, the default risk level, and that may lead to a hit, the default risk level, and
@ -869,8 +869,10 @@ For example, to see the most of the signatures (function names)
that map to CWE-327, that map to CWE-327,
without seeing the default risk level or detailed warning text, without seeing the default risk level or detailed warning text,
run ``flawfinder \-\-listrules | grep CWE-327 | cut -f1''. run ``flawfinder \-\-listrules | grep CWE-327 | cut -f1''.
However, while this procedure lists all CWE security elements, You can also see the tokens without a CWE mapping this way by running
this procedure only lists the default mappings ``flawfinder -D --listrules | grep -v CWE-''.
However, while \-\-listrules lists all CWE security elements,
it only lists the default mappings
from CWE security elements to CWE identifiers. from CWE security elements to CWE identifiers.
It does not include the refinements It does not include the refinements
that flawfinder applies (e.g., by examining function parameters). that flawfinder applies (e.g., by examining function parameters).