Skip to main content

Java and JSP Vulnerability Static Analyzer

Project description

DRSource

DRSource is an extensible, multi-language static analysis tool designed to detect vulnerabilities in source code. It uses a pluggable architecture to combine multiple detection techniques—from simple regex matching to advanced AST-based taint analysis—all driven by a central, user-configurable knowledge base.

It identifies security issues such as SQL Injection, Cross-Site Scripting (XSS), Command Injection, Hardcoded Secrets, and many others across all supported languages in a single, unified scan.

Features

  • Extensible Plugin Architecture The scanner automatically discovers and runs all available analyzer plugins. This allows new languages (e.g., Python, Go) and new analysis techniques (e.g., control-flow analysis) to be added without changing the corFeatures

  • Centralized Knowledge Base All rules—from simple regex patterns to complex AST sources and sinks for taint analysis—are defined in a single, human-readable knowledge_base.yaml file. This makes it easy to add or customize rules for any supported language.

  • Multi-Engine Analysis (in one scan) DRSource runs all plugins simultaneously, giving you a complete picture of your codebase:

    • Regex Engine: Uses a high-speed, general-purpose regex plugin to find known vulnerability patterns and hardcoded secrets in any file type.

    • AST Taint Engine: Performs deep data-flow analysis by parsing code into an Abstract Syntax Tree (AST) to track taint from user input sources (e.g., request.getParameter) to sensitive sinks (e.g., executeQuery).

  • Persistent Database & Scan Comparison All findings are stored in a local SQLite database, allowing you to:

    • View scan history (--history).
    • Compare scans to find new, resolved, and persistent vulnerabilities (--compare).
  • Robust CLI & Reporting The command-line interface offers powerful options, including:

    • Database initialization (--init-db).
    • Exporting results in multiple formats (--export [sarif|json|ascii]).
    • Taint-flow visualization (--show-trace).

Installation

Clone the repository and navigate to the project root:

git clone https://github.com/thesp0nge/dr_source.git
cd dr_source

Install the package (and all dependencies) in editable mode:

 pip install --editable .

This automatically registers all core plugins (JavaAstAnalyzer, RegexAnalyzer) so the scanner can find them.

Usage

Run dr_source against any source code directory. It will automatically detect all file types and run the appropriate analyzer plugins.

dr_source [OPTIONS] TARGET_PATH

Options

  • TARGET_PATH: The path of the codebase to analyze.
  • --init-db: Initialize the database from scratch (drops and recreates tables).
  • --history: Display the scan history for the project.
  • --compare : Compare the latest scan with a previous scan specified by ID.
  • --export [sarif|json|ascii]: Export scan results in the specified format.
  • --output : Output file for the exported report.
  • --show-trace: Display the full data-flow trace for AST-based vulnerabilities.
  • --debug: Enable debug logging.
  • --version: Show DRSource version and exit.

Examples

  • Run a Standard Scan This one command runs all plugins (Regex, AST, etc.) on the codebase.
dr_source /path/to/my-project
  • Export Results as SARIF (Ideal for uploading to GitHub Security)
dr_source --export sarif --output findings.sarif /path/to/my-project
  • View Taint Traces
dr_source --show-trace /path/to/my-project
  • Initialize the database
dr_source --init-db /path/to/my-project

Contributing

Contributions are welcome! With the new architecture, there are two main ways to contribute:

  1. Add/Improve a Rule:
  • Simply edit the dr_source/config/knowledge_base.yaml file to add a new regex pattern or an AST sink/source.
  1. Add a New Plugin:
  • Create a new plugin package (e.g., dr_source/plugins/python/).
  • Write your new analyzer class (e.g., PythonAstAnalyzer) that implements the AnalyzerPlugin API.
  • Register your new plugin in the entry_points section of setup.py.

For all contributions, please fork the repository, create a new branch, and submit a pull request.

License

dr_source is licensed under the MIT License.

Acknowledgments

Special thanks to the maintainers of javalang for their work on Java AST parsing, which powers the Java taint analysis plugin.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

dr_source-0.90.0.tar.gz (21.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

dr_source-0.90.0-py3-none-any.whl (22.2 kB view details)

Uploaded Python 3

File details

Details for the file dr_source-0.90.0.tar.gz.

File metadata

  • Download URL: dr_source-0.90.0.tar.gz
  • Upload date:
  • Size: 21.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.9

File hashes

Hashes for dr_source-0.90.0.tar.gz
Algorithm Hash digest
SHA256 60cb9369ce4420f27bcc569b6c789a44d02d8dd0cbcd4a3ba0ae218d498a7197
MD5 901ec78e95be7958ceb9e1fe7b06f384
BLAKE2b-256 3e5fcaff9fb2e92befaf044d79f578c6bec8495fe0492720be814df1e1aec5ef

See more details on using hashes here.

File details

Details for the file dr_source-0.90.0-py3-none-any.whl.

File metadata

  • Download URL: dr_source-0.90.0-py3-none-any.whl
  • Upload date:
  • Size: 22.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.2.0 CPython/3.13.9

File hashes

Hashes for dr_source-0.90.0-py3-none-any.whl
Algorithm Hash digest
SHA256 5a8949505fc228b99e4f76f46ab71d1c98088bff5ce1efa6d2016fdb5e244adf
MD5 7168d96f2c671422f5b4f34b0ed8a636
BLAKE2b-256 6aa308501dd6ae3286b618f13e1f32dc3fb05e6b0074f4fa83d87c4aded07210

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page