Skip to content

b4zinga/codeql-sarif-viewer

Repository files navigation

Codeql Sarif Viewer

sarif-viewer.html

生成codeql sarif格式报告,在浏览器打开sarif-viewer.html,导入报告即可查看漏洞链路。

# example

# create database
codeql database create vuln-flask-db -s vuln-flask-app -l python

# analyze database
codeql database analyze vuln-flask-db -o vuln-flask-full.sarif --format=sarif-latest --sarif-add-snippets --sarif-add-file-contents

codeql database analyze vuln-flask-db -o vuln-flask-medium.sarif --format=sarif-latest --sarif-add-snippets

codeql database analyze vuln-flask-db -o vuln-flask-brief.sarif --format=sarif-latest

导入报告

查看漏洞链路

sarif-extractor.py

usage:

usage: sarif-extractor.py [-h] [-o OUTPUT] [-s SOURCE_ROOT] [-f {json,json-compact,text}] [-n]
                          sarif_file

从 CodeQL SARIF 报告中提取漏洞链路和源代码

positional arguments:
  sarif_file            SARIF 文件路径

options:
  -h, --help            show this help message and exit
  -o OUTPUT, --output OUTPUT
                        输出文件路径
  -s SOURCE_ROOT, --source-root SOURCE_ROOT
                        源代码根目录
  -f {json,json-compact,text}, --format {json,json-compact,text}
  -n, --with-line-number
                        输出文件内容时带行号

example

python sarif-extractor.py -f text -n vuln-flask-full.sarif
✓ 已保存 4 个漏洞到 vuln-flask-full_vulnerabilities.txt

统计信息:
  总漏洞数: 4
  规则分布:
    py/stack-trace-exposure: 2
    py/full-ssrf: 2

vuln-flask-full_vulnerabilities.txt


The code is generated by AI.

About

codeql sarif report viewer

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors