T
T
tendkuh2019-05-14 15:22:47
Information Security
tendkuh, 2019-05-14 15:22:47

How to check someone else's code for safety, if you are not particularly versed in all the intricacies of the language?

Almost all development on the web lately has been reduced to copy-pasting code from SO
How to protect yourself from "leaky" or unsafe code
Is there a specialized service on the network that checks the code for safety?

Answer the question

In order to leave comments, you need to log in

4 answer(s)
M
Moskus, 2019-05-14
@tendkuh

Well, that's MMORPG thinking again.
In order to solve a problem, you need to be able to solve the problem. Or give it to someone who knows how to solve it.
Because any automatic code analyzer also requires understanding what warnings it issues and why it issues it.
Code that is included in large projects and/or made public doesn't magically become good. He only gets better because more good programmers look at him, and not those who have learned how to write hello world.
Simple publicity does not guarantee this, but only slightly increases the likelihood. That is why, there are quite high-quality opensource projects, and there is a glitch on a glitch, despite the large number of participants.
Your own ability to program well also increases the likelihood of getting quality code, just like someone else's. And your own inability - lowers it, in spite of everything else, simply according to the statistical laws of reliability.

R
Rsa97, 2019-05-14
@Rsa97

Stop copy-pasting and start writing code yourself.

R
Robur, 2019-05-14
@Robur

There is only one real option: Hire / persuade someone who understands.
If it does not suit you, then you are not very serious about the project, then security is not very relevant to you either.

P
PyNen, 2019-07-30
@PyNen

Try to contact the laboratory of complex protection of informatization objects. It has been taught for years. You will definitely find it with this query. I already searched. Also check out Howdy Ho's channel. There about vulnerabilities are (not only sql injections). There is about js.

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question