Remix.run Logo
unshavedyak 8 hours ago

Would be neat if the call graph could be asserted easily.. As you could not only validate what vulnerabilities you are / aren't exposed to, but also choose to blacklist some API calls as a form of mitigation. Ensuring you don't accidentally start using something that's proven unsafe.

chii 40 minutes ago | parent | next [-]

but then if you could assert the call graph (easily, or even provably correctly), then why not just cull the unused code that led to vulnerability in the first place?

viraptor 7 hours ago | parent | prev [-]

https://bandit.readthedocs.io/en/latest/ can do that for python.