Static Analysis of Corpus of Source Codes of Python Applications.

Saved in:
Bibliographic Details
Title: Static Analysis of Corpus of Source Codes of Python Applications.
Authors: Kapustin, D. A., Shvyrov, V. V., Shulika, T. I.
Source: Programming & Computer Software; Aug2023, Vol. 49 Issue 4, p302-309, 8p
Subject Terms: SOURCE code, PYTHONS, PYTHON programming language, CORPORA, ROBBERS
Abstract: A static analysis method is one of the popular methods of software code analysis. Such method allows checking the code for compliance with the language specification as well as finding potential vulnerabilities. In this work, a static analysis of a corpus of listings of open-source Python applications is performed. Using the Bandit library, statistical values of various categories of potential vulnerabilities are found, and a rating table of vulnerabilities detected in the dataset involved is constructed. A qualitative analysis of threats is performed according to their severity based on the CWE data. [ABSTRACT FROM AUTHOR]
Copyright of Programming & Computer Software is the property of Springer Nature and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
Database: Complementary Index
Description
Abstract:A static analysis method is one of the popular methods of software code analysis. Such method allows checking the code for compliance with the language specification as well as finding potential vulnerabilities. In this work, a static analysis of a corpus of listings of open-source Python applications is performed. Using the Bandit library, statistical values of various categories of potential vulnerabilities are found, and a rating table of vulnerabilities detected in the dataset involved is constructed. A qualitative analysis of threats is performed according to their severity based on the CWE data. [ABSTRACT FROM AUTHOR]
ISSN:03617688
DOI:10.1134/S0361768823040072