| ▲ | unshavedyak 8 hours ago | |
Would be neat if the call graph could be asserted easily.. As you could not only validate what vulnerabilities you are / aren't exposed to, but also choose to blacklist some API calls as a form of mitigation. Ensuring you don't accidentally start using something that's proven unsafe. | ||
| ▲ | chii 40 minutes ago | parent | next [-] | |
but then if you could assert the call graph (easily, or even provably correctly), then why not just cull the unused code that led to vulnerability in the first place? | ||
| ▲ | viraptor 7 hours ago | parent | prev [-] | |
https://bandit.readthedocs.io/en/latest/ can do that for python. | ||