MS CAT.NET v2.0 Beta - Code Analysis Tool .NET
CAT.NET is a binary code analysis tool that helps identify common variants of certain prevailing vulnerabilities that can give rise to common attack vectors such as Cross-Site Scripting (XSS), SQL Injection and XPath Injection.
This beta includes an integrated user experience with Visual Studio 2010 and FxCop command prompt. Version 2.0 beta contains tainted data flow analysis and a configuration analysis engine, that identifies insecure configuration files. In all there are 46 new configuration and 9 data flow rules.
The goal of this beta program is to garner feedback from the user community. Please send all feedback to:
ist-cat ---@--- microsoft.com
- Integration with Visual Studio 2010 code analysis infrastructure as FxCop rules.
- Easy analysis using FxCop command line or UI interface or VSTS Team Build.
- Currently beta includes FxCop UI and Command prompt.
- Total of 55 rules have been added. There are 9 data flow rules and 46 configuration rules are included in this version.
- Updated tainted data flow analysis engine to track both tainted operands and source symbols.
- Reduced false positives and false negatives.
- Accomplished by detecting sanitizers, constant variables and instructions that affect the data flow.
- New Data flow rule to detect XML Injection attacks
- Updated configuration rules engine detecting clear text connection strings and credentials.
- Rules to detect insecure defaults.
- Example minRequiredPasswordLength attribute of membership providers add element.
- Configuration rules updated to detect @page directive configuration overrides.
All current known issues have been included in the CAT.NET v2.0 Beta guide document.
More information: here