Skip to content

Transitive call graph for python cryptographic operations #703

Answered by RasmusWL
nettrino asked this question in Q&A
Discussion options

You must be logged in to vote

Thanks for also looking into this @intrigus-lgtm 💪 here is my take on it

@nettrino can you explain why you are interested in finding all transitive calls to cryptographic operations? Are you trying to build way to build a way to do a security audit of cryptographic operations? (Sometimes the underlying reason for asking technical questions can help solve the problem in a different way)

Anyway, below is my current best solution. This relies on the points-to based call-graph, which we know isn't perfect, and we're currently working on replacing that with something better. (also notice that this will exclude cryptographic operations that happens on module level, since that isn't within a fun…

Replies: 2 comments 2 replies

Comment options

You must be logged in to vote
1 reply
@nettrino
Comment options

Comment options

You must be logged in to vote
1 reply
@nettrino
Comment options

Answer selected by nettrino
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
3 participants