just to try to set expectations with some of these tools... yes, the level of effort is comparable with pouring through gcc's output with - Wall and -Wextra and attempting to fix every warning. actually... the trick is... how do you get the tool to emit only "interesting" warnings rather than a whole bunch of warnings you can conceivably ignore? With fortify's tools, there's a lot of configurability allowing the analyst to ignore or add different tests depending on the analyst's wetware settings. BTW, this is one of the ways static analysis tools can be used to funnel people into professional services engagements. People build expertise in not only using the tool, but in configuring and defining rules for the tool to ignore warnings and detect errors. So in the same way i had a little bit of head scratching when i moved from cc to xlC and from xlC to gcc, learning how to use static analysis tools can be a task in and of itself.

so... there might be some benefits to selecting an individual and getting them to be the "static analysis person." (i.e. - the person who knows how to apply the tool to the codebase.) and as Rob mentioned... at least at the Lab, it probably makes sense to include this in our overall "source code security" process. outside the lab... it might make sense for someone outside the lab to develop experience with tools like fortify, prevent and whatever the latest offering from Ounce Labs is (can't remember off the top of my head.) again... it would be nice for there to be coordination between the in-lab and out- of-lab resources, so yay! one more ball for Robla to juggle.

but... at the end of the day... anyone can download the source for the viewer, related libraries and open-source static analysis tools.

-cheers,
-meadhbh/infinity

On Jan 11, 2009, at 11:42 PM, Gareth Nelson wrote:

e. it is characteristic of these tools that there is some give and take between the tool and the tool using mammal behind the keyboard. many static analysis tools are quite configurable and allow the user to perform invasive scans that produce an ox-stunning amount of output or to perform a light scan, which gives little of value. there's a lot of finesse required to use these tools effectively. this has led some to consider these tools thinly
veiled professional services sales vehicles.
As someone who's not used these tools personally, how comparable are
they to paranoid compiler options that produce 10 billion warnings?
Running through build.log and using compiler warnings as a checklist
in my own projects is almost a hobby for me.....

_______________________________________________
Policies and (un)subscribe information available here:
http://wiki.secondlife.com/wiki/SLDev
Please read the policies before posting to keep unmoderated posting privileges

Reply via email to