Debugging False Positives and False Negatives
False Positives occur when Pysa finds an issue that is not valid, either because the flow cannot actually happen or because it is not a security risk.
False Negatives occur when there is a legitimate flow of tainted data from a source to a sink, but Pysa fails to catch it.
Common Causes of False Positivesβ
Taint broadeningβ
Pysa uses a set of heuristics in order to make the analysis scale to millions of lines of code. The main heuristic is called taint broadening (also called taint collapsing), which happens when Pysa is tracking too many attributes of an object or keys of a dictionary.
To avoid blowing up, Pysa will collapse taint, and assume the whole object is tainted. Pysa will use sane defaults, but heuristics can be tuned using command line options or a taint configuration file.
Taint collapsing also happens when taint flows through a function that Pysa does
not have the code for. To be sound, it assumes functions without code
automatically propagate taint on arguments to their return value. This can be
avoided by providing a model for these functions using
@SkipObscure
.
Common Causes of False Negativesβ
Missing Type Informationβ
Pysa relies on type information from Pyre to identify sources and sinks, and to build the call graph needed to follow the propagation of taint between the two. Just because type information is available somewhere in the code, does not mean Pyre will know the type of an object in the exact place where Pysa needs it. See the documentation on Coverage Increasing Strategies for tips on how to increase type coverage. The following examples demonstrate how lost type information leads to lost flows.
Missing Sources/Sinksβ
HttpRequest.GET
is a common source of UserControlled
data in Django. If the
request
objects are not explicitly typed as HttpRequest
, however, Pysa will
fail to detect obvious issues:
from django.http import HttpRequest
def this_is_missed(request):
# This flow WILL NOT be found, because Pysa does not know the type of
# 'request' at this point and thus does not know 'request.GET' is a source
# (even though the type is known in 'run')
eval(request.GET["command"])
def this_is_caught(request: HttpRequest):
# This flow WILL be found.
eval(request.GET["command"])
def run(request: HttpRequest):
this_is_missed(request)
this_is_caught(request)
Incomplete Call Graphβ
Pysa relies on type information in order to build a call graph that accurately
tracks a method call of foo.bar(x)
to the def bar(self, x)
implementation.
Without type information on bar
, Pysa will be unable to figure out how to
dispatch the call and the flow will be lost:
from django.http import HttpRequest
class Runner:
def run(self, command: str) -> None:
eval(command)
def this_is_missed(request: HttpRequest, runner):
# This flow WILL NOT be found, because Pysa does not know the type of
# 'runner', and thus does not know where the 'run' call dispatches to
runner.run(request.GET["command"])
def this_is_caught(request: HttpRequest, runner: Runner):
# This flow WILL be found.
runner.run(request.GET["command"])
Globalsβ
To allow for parallel processing, Pysa is limited in it's ability to track taint flows through global variables. For example, Pysa will not detect an issue in the following code:
user_controlled_data = ""
def load_data(request: HttpRequest) -> None:
user_controlled_data = request.GET["data"]
def run_command(request: HttpRequest) -> None:
load_data(request)
eval(user_controlled_data)
The best workaround is to avoid using globals in your code. If a refactor isn't
possible, but you do know what globals should be considered tainted, you can
explicitly declare the global tainted in your .pysa
files.
Methodology for Debugging False Positives and False Negativesβ
There are three recommended ways to debug false positives and false negatives.
If the analysis is reasonably fast on your code, or that you are able to reproduce the false positive or false negative on a smaller code, you can use the reveal_taint approach.
If, instead, the analysis is slow on your code (say, more than 5 minutes) and that you are unable to reproduce on a small example, you can use the model explorer or SAPP summaries approach.
In all cases, you should first:
- Identify the flow you expect to see (or not see):
- Source
- Sink
- Every function call/return that propagates the tainted data from the source to the sink
- Every variable that the tainted data passes through, within the identified functions. This usually includes the parameter which initially received the taint, and then 0 or more local variables that hold the tainted data as it is transformed in some way.
Reveal taint approachβ
This approach is based on the magic functions
reveal_taint
and
reveal_type
.
- Add a
reveal_taint
andreveal_type
statement to each of the variables that must be tainted (or not), as identified in step 1. - Start following the flow from source to sink in your code, and find the
corresponding output for each
reveal_taint
statement.- Note that each time Pysa analyzes a function (could be many times), it will
dump the latest taint information, so the last instance of
reveal_taint
output for a given line will be the most accurate and is the one you should look at. reveal_taint
output exposes some of the implementation details of Pysa, by giving youRevealed forward taint
andRevealed backward taint
messages. Without going into those details, you should expect to see either the source name (eg.UserControlled
) you care about appearing in theRevealed forward taint
output, or the sink name (eg.RemoteCodeExecution
) you care about in theRevealed backward taint
output.- For each
reveal_taint
, following the flow of tainted data from source to sink, locate the output in the logs that reveals the taint (eg.integration_test.reveal_taint:20:4-20:16: Revealed forward taint for ``command``:
). - If you see your source or sink name in the output, then go back to 1) and
carry on with the next
reveal_taint
statement. If you do not see the source or sink name, then that means the cause of the false negative is likely between your previousreveal_taint
and the one you're currently looking at. Refer to the "Commom Causes of False Negatives" section above for ideas on the cause, and how to fix it.
- Note that each time Pysa analyzes a function (could be many times), it will
dump the latest taint information, so the last instance of
Model explorer approachβ
This approach uses the Pysa Model Explorer to interactively explore the taint output results.
- Perform a full run using the
--save-results-to
parameters. - Start the Pysa Model Explorer. For each function or method
identified in step 1, retrieve the fully qualified name of the callable using
callables_containing
, then useprint_model(<fully-qualified-name>)
.- If the return variable should be tainted, you should see a source on the
result
port. - If an argument should be tainted, you should see a sink on a port named
formal(<argument-name>)
. - This should allow you to figure out in which callable the taint is incorrectly lost (for a false negative) or where the taint is incorrectly kept (for a false positive).
- If you still don't know what is wrong, you can try to add a
pyre_dump
call in a given callable, and run pysa again. This will produce very verbose logs, which might be hard to navigate.
- If the return variable should be tainted, you should see a source on the
SAPP summaries approachβ
This approach uses the SAPP Summaries Explorer to interactively explore the taint output results. The approach is the same as "Model explorer approach" but can be done in a graphical way.
Upload SAPP Summary for the run which the issue belongs to: Click on the arrow on the top right of the SAPP UI Run page and click Upload Run.
Open SAPP Summaries Web UI: After a while refresh the run page and you should see
Available: Load in VS Code or View on Web
. Click on the View on Web link which brings you to a UI where you'll insert the fully qualified domain name of the functions you want to reviewIdentify the frame/function where the taint flow was interrupted reviewing the sink trace: Start from the sink (last frame) and use SAPP Summary check if the last frame function has the correct taint associated with the correct parameter (
formal
). For example in (this)[https://fburl.com/security/4dmlih2v] issue check in SAPP Summary if inweather.service.WeatherAPIService.async_current_weather_api_json
sinks
list the parameterself[lng]
is tainted with the sink kind we want to track in the issue (in our exampleHTTPClientRequestSchematized_URI
). If this is the case repeat the same process for the next frame (weather.service.WeatherAPIService._async_get_current_weather_from_api
) until reaching a function which does not propagate the taint correctly (move to point 5) or the Trace Root Callable (move to point 4).Identify the frame/function where the taint flow was interrupted reviewing the source trace: Apply the same process starting from the source and checking the correct taint propagation in the
result
value of SAPP summary (value returned by the function). Example (issue)[https://fburl.com/security/dh4wowfm] we start fromusers.user_phone_fetcher.UserPhoneFetcher.async_get_phone_number_node
(which is the first frame) and check if SAPP summary is correctly showing theNodeEdgeGetter
source in theresult
port (which represent the return value of the function). If this is the case repeat the same process for the next frame until reaching a function which does not propagate the taint correctly.Identify the root cause:
- Check recent changes to the code which may have altered Pysa ability to track the taint or simply deleted the flow
- Manually review the code and see if there are patterns described in
common causes of false negatives or in
open pysa false negatives/false positive tasks (tags
pysa-bug
andfalse-negative
/false-positive
or child tasks of T145051608).
Example using reveal_taint
β
Pysa will not be able to detect a vulnerability in the following code:
from django.http import HttpRequest, HttpResponse
class Runner:
def run(self, command: str) -> None:
eval(command)
def get_command(request: HttpRequest) -> str:
command = request.GET["command"]
return command
def execute_command(runner: Runner, command):
runner.run(command)
def start(request: HttpRequest):
command = get_command(request)
runner = Runner()
execute_command(runner, command)
Folling the above debugging steps we identify the flow of data from beginning to end, and add debugging statements:
from django.http import HttpRequest, HttpResponse
class Runner:
def run(self, command: str) -> None:
reveal_type(command)
reveal_taint(command)
eval(command) # 5. User controlled data reaches the sink in here
def get_command(request: HttpRequest) -> str:
command = request.GET["command"] # 1. User controlled data originates here
reveal_type(command)
reveal_taint(command)
return command
def execute_command(runner: Runner, command):
reveal_type(command)
reveal_taint(command)
reveal_type(runner)
reveal_taint(runner)
runner.run(command) # 4. User controlled data is passed in here
def start(request: HttpRequest):
command = get_command(request) # 2. User controlled data is returned here
reveal_type(command)
reveal_taint(command)
runner = Runner()
execute_command(runner, command) # 3. User controlled data is passed in here
See the appendix for the full output of running pyre --noninteractive analyze
on this example.
Starting at 1), we see this in the output:
2020-12-28 13:02:36,486 [PID 3382063] WARNING integration_test.reveal_taint:13:4-13:16: Revealed forward taint for `command`: @integration_test.reveal_taint:11:14-11:25 -> UserControlled -> SimpleFeature: [Features.Simple.LeafName {leaf = "Obj{django.http.request.HttpRequest.GET}";
2020-12-28 13:02:36,486 [PID 3382063] WARNING port = None}], ComplexFeature: [], TraceLength: 0, FirstIndex: ["command"], FirstField: []
2020-12-28 13:02:36,486 [PID 3382063] WARNING UserControlled_Payload -> SimpleFeature: [Features.Simple.LeafName {leaf = "Obj{django.http.request.HttpRequest.GET}";
2020-12-28 13:02:36,486 [PID 3382063] WARNING port = None}], ComplexFeature: [], TraceLength: 0, FirstIndex: ["command"], FirstField: []
2020-12-28 13:02:36,486 [PID 3382063] WARNING
2020-12-28 13:02:36,486 [PID 3382063] WARNING integration_test.reveal_taint:13:4-13:25: Revealed backward taint for `command`: declaration -> LocalReturn -> SimpleFeature: [], ComplexFeature: [(Features.Complex.ReturnAccessPath [])], TraceLength: 4611686018427387903, FirstIndex: [], FirstField: []
Removing the timestamps and other noise gives us:
integration_test.reveal_taint:13:4-13:16:
Revealed forward taint for `command`:
@integration_test.reveal_taint:11:14-11:25 -> UserControlled ->
SimpleFeature: [
Features.Simple.LeafName {
leaf = "Obj{django.http.request.HttpRequest.GET}"; port = None
}
],
ComplexFeature: [],
TraceLength: 0,
FirstIndex: ["command"],
FirstField: []
UserControlled_Payload -> SimpleFeature: [
Features.Simple.LeafName {
leaf = "Obj{django.http.request.HttpRequest.GET}"; port = None
}
],
ComplexFeature: [],
TraceLength: 0,
FirstIndex: ["command"],
FirstField: []
integration_test.reveal_taint:13:4-13:25:
Revealed backward taint for `command`:
declaration -> LocalReturn ->
SimpleFeature: [],
ComplexFeature: [(Features.Complex.ReturnAccessPath [])],
TraceLength: 4611686018427387903,
FirstIndex: [],
FirstField: []
For debugging false negatives, the only portion we care about is:
Revealed forward taint for `command`:
@integration_test.reveal_taint:11:14-11:25 -> UserControlled
This confirms that on line 11 (characters 14-25), we did indeed detect that
command
was tainted as UserControlled
.
Moving on to 2, the forward taint
output again tells us that we have
UserControlled
taint on command
at line 26 (characters 4-16).
Starting with 4, we notice that we no longer see UserControlled
or
RemoteCodeExecution
in our revealed forward or backwards taint:
2020-12-28 13:02:35,472 [PID 3382063] WARNING integration_test.reveal_taint:18:4-18:16: Revealed forward taint for `command`:
2020-12-28 13:02:35,472 [PID 3382063] WARNING
2020-12-28 13:02:35,472 [PID 3382063] WARNING integration_test.reveal_taint:18:4-18:25: Revealed backward taint for `command`:
2020-12-28 13:02:35,472 [PID 3382063] WARNING
This has helped us narrow down the problem to the execute_command
function. In
the end, the problem was that we did not have type information on runner
, so
Pysa did not know where the definition of runner.run
was. Without knowing
where the definition was, Pysa couldn't know that run
containted a sink and
thus couldn't know that command
eventually reached that sink.
Appendixβ
Subset of the output from running pyre --noninteractive analyze
on the
example:
2020-12-28 13:02:31,719 [PID 3382063] PERFORMANCE Overrides recorded: 2.408138s
2020-12-28 13:02:31,719 [PID 3382063] INFO Building call graph...
2020-12-28 13:02:34,166 [PID 3382063] PERFORMANCE Call graph built: 2.447174s
2020-12-28 13:02:34,166 [PID 3382063] INFO Call graph edges: 100
2020-12-28 13:02:34,166 [PID 3382063] INFO Computing overrides...
2020-12-28 13:02:34,311 [PID 3382063] PERFORMANCE Computed overrides: 0.144886s
2020-12-28 13:02:34,311 [PID 3382063] PERFORMANCE Pre-fixpoint computation for static analysis: 7.664068s
2020-12-28 13:02:34,311 [PID 3382063] INFO Analysis fixpoint started for 3075 overrides 68 functions...
2020-12-28 13:02:34,311 [PID 3382063] INFO Iteration #0. 3143 Callables [...]
2020-12-28 13:02:35,471 [PID 3382063] WARNING integration_test.reveal_taint:6:8-6:19: Revealed type for command: str
2020-12-28 13:02:35,471 [PID 3382063] WARNING integration_test.reveal_taint:7:8-7:20: Revealed forward taint for `command`:
2020-12-28 13:02:35,471 [PID 3382063] WARNING
2020-12-28 13:02:35,471 [PID 3382063] WARNING integration_test.reveal_taint:7:8-7:29: Revealed backward taint for `command`: @integration_test.reveal_taint:8:13-8:20 -> RemoteCodeExecution -> SimpleFeature: [Features.Simple.LeafName {leaf = "eval"; port = None}], ComplexFeature: [], TraceLength: 0, FirstIndex: [], FirstField: []
2020-12-28 13:02:35,472 [PID 3382063] WARNING
2020-12-28 13:02:35,472 [PID 3382063] WARNING integration_test.reveal_taint:17:4-17:15: Revealed type for command: typing.Any
2020-12-28 13:02:35,472 [PID 3382063] WARNING integration_test.reveal_taint:18:4-18:16: Revealed forward taint for `command`:
2020-12-28 13:02:35,472 [PID 3382063] WARNING
2020-12-28 13:02:35,472 [PID 3382063] WARNING integration_test.reveal_taint:19:4-19:15: Revealed type for command: typing.Any
2020-12-28 13:02:35,472 [PID 3382063] WARNING integration_test.reveal_taint:20:4-20:16: Revealed forward taint for `command`:
2020-12-28 13:02:35,472 [PID 3382063] WARNING
2020-12-28 13:02:35,472 [PID 3382063] WARNING integration_test.reveal_taint:20:4-20:25: Revealed backward taint for `command`:
2020-12-28 13:02:35,472 [PID 3382063] WARNING
2020-12-28 13:02:35,472 [PID 3382063] WARNING integration_test.reveal_taint:18:4-18:25: Revealed backward taint for `command`:
2020-12-28 13:02:35,472 [PID 3382063] WARNING
2020-12-28 13:02:35,473 [PID 3382063] WARNING integration_test.reveal_taint:12:4-12:15: Revealed type for command: str
2020-12-28 13:02:35,473 [PID 3382063] WARNING integration_test.reveal_taint:13:4-13:16: Revealed forward taint for `command`: @integration_test.reveal_taint:11:14-11:25 -> UserControlled -> SimpleFeature: [Features.Simple.LeafName {leaf = "Obj{django.http.request.HttpRequest.GET}";
2020-12-28 13:02:35,473 [PID 3382063] WARNING port = None}], ComplexFeature: [], TraceLength: 0, FirstIndex: ["command"], FirstField: []
2020-12-28 13:02:35,473 [PID 3382063] WARNING UserControlled_Payload -> SimpleFeature: [Features.Simple.LeafName {leaf = "Obj{django.http.request.HttpRequest.GET}";
2020-12-28 13:02:35,473 [PID 3382063] WARNING port = None}], ComplexFeature: [], TraceLength: 0, FirstIndex: ["command"], FirstField: []
2020-12-28 13:02:35,473 [PID 3382063] WARNING
2020-12-28 13:02:35,473 [PID 3382063] WARNING integration_test.reveal_taint:13:4-13:25: Revealed backward taint for `command`: declaration -> LocalReturn -> SimpleFeature: [], ComplexFeature: [(Features.Complex.ReturnAccessPath [])], TraceLength: 4611686018427387903, FirstIndex: [], FirstField: []
2020-12-28 13:02:35,473 [PID 3382063] WARNING
2020-12-28 13:02:35,480 [PID 3382063] WARNING integration_test.reveal_taint:25:4-25:15: Revealed type for command: str
2020-12-28 13:02:35,480 [PID 3382063] WARNING integration_test.reveal_taint:26:4-26:16: Revealed forward taint for `command`: via call@integration_test.reveal_taint:24:14-24:34[integration_test.reveal_taint.get_command][{ root = LocalResult; path = [] }] -> UserControlled -> SimpleFeature: [Features.Simple.LeafName {leaf = "Obj{django.http.request.HttpRequest.GET}";
2020-12-28 13:02:35,480 [PID 3382063] WARNING port = None}], ComplexFeature: [], TraceLength: 1, FirstIndex: ["command"], FirstField: []
2020-12-28 13:02:35,480 [PID 3382063] WARNING UserControlled_Payload -> SimpleFeature: [Features.Simple.LeafName {leaf = "Obj{django.http.request.HttpRequest.GET}";
2020-12-28 13:02:35,480 [PID 3382063] WARNING port = None}], ComplexFeature: [], TraceLength: 1, FirstIndex: ["command"], FirstField: []
2020-12-28 13:02:35,480 [PID 3382063] WARNING
2020-12-28 13:02:35,481 [PID 3382063] WARNING integration_test.reveal_taint:26:4-26:25: Revealed backward taint for `command`:
2020-12-28 13:02:35,481 [PID 3382063] WARNING
2020-12-28 13:02:35,546 [PID 3382063] PERFORMANCE Expensive callables for iteration 0:
2020-12-28 13:02:35,577 [PID 3382063] INFO Iteration #0, 3143 callables, heap size 46105024 took 1.266790s
2020-12-28 13:02:35,578 [PID 3382063] INFO Iteration #1. 3038 Callables [...]
2020-12-28 13:02:36,482 [PID 3382063] WARNING integration_test.reveal_taint:6:8-6:19: Revealed type for command: str
2020-12-28 13:02:36,482 [PID 3382063] WARNING integration_test.reveal_taint:7:8-7:20: Revealed forward taint for `command`:
2020-12-28 13:02:36,483 [PID 3382063] WARNING
2020-12-28 13:02:36,483 [PID 3382063] WARNING integration_test.reveal_taint:7:8-7:29: Revealed backward taint for `command`: @integration_test.reveal_taint:8:13-8:20 -> RemoteCodeExecution -> SimpleFeature: [Features.Simple.LeafName {leaf = "eval"; port = None}], ComplexFeature: [], TraceLength: 0, FirstIndex: [], FirstField: []
2020-12-28 13:02:36,483 [PID 3382063] WARNING
2020-12-28 13:02:36,486 [PID 3382063] WARNING integration_test.reveal_taint:12:4-12:15: Revealed type for command: str
2020-12-28 13:02:36,486 [PID 3382063] WARNING integration_test.reveal_taint:13:4-13:16: Revealed forward taint for `command`: @integration_test.reveal_taint:11:14-11:25 -> UserControlled -> SimpleFeature: [Features.Simple.LeafName {leaf = "Obj{django.http.request.HttpRequest.GET}";
2020-12-28 13:02:36,486 [PID 3382063] WARNING port = None}], ComplexFeature: [], TraceLength: 0, FirstIndex: ["command"], FirstField: []
2020-12-28 13:02:36,486 [PID 3382063] WARNING UserControlled_Payload -> SimpleFeature: [Features.Simple.LeafName {leaf = "Obj{django.http.request.HttpRequest.GET}";
2020-12-28 13:02:36,486 [PID 3382063] WARNING port = None}], ComplexFeature: [], TraceLength: 0, FirstIndex: ["command"], FirstField: []
2020-12-28 13:02:36,486 [PID 3382063] WARNING
2020-12-28 13:02:36,486 [PID 3382063] WARNING integration_test.reveal_taint:13:4-13:25: Revealed backward taint for `command`: declaration -> LocalReturn -> SimpleFeature: [], ComplexFeature: [(Features.Complex.ReturnAccessPath [])], TraceLength: 4611686018427387903, FirstIndex: [], FirstField: []
2020-12-28 13:02:36,486 [PID 3382063] WARNING
2020-12-28 13:02:36,486 [PID 3382063] WARNING integration_test.reveal_taint:25:4-25:15: Revealed type for command: str
2020-12-28 13:02:36,486 [PID 3382063] WARNING integration_test.reveal_taint:26:4-26:16: Revealed forward taint for `command`: via call@integration_test.reveal_taint:24:14-24:34[integration_test.reveal_taint.get_command][{ root = LocalResult; path = [] }] -> UserControlled -> SimpleFeature: [Features.Simple.LeafName {leaf = "Obj{django.http.request.HttpRequest.GET}";
2020-12-28 13:02:36,486 [PID 3382063] WARNING port = None}], ComplexFeature: [], TraceLength: 1, FirstIndex: ["command"], FirstField: []
2020-12-28 13:02:36,486 [PID 3382063] WARNING UserControlled_Payload -> SimpleFeature: [Features.Simple.LeafName {leaf = "Obj{django.http.request.HttpRequest.GET}";
2020-12-28 13:02:36,487 [PID 3382063] WARNING port = None}], ComplexFeature: [], TraceLength: 1, FirstIndex: ["command"], FirstField: []
2020-12-28 13:02:36,487 [PID 3382063] WARNING
2020-12-28 13:02:36,492 [PID 3382063] WARNING integration_test.reveal_taint:26:4-26:25: Revealed backward taint for `command`:
2020-12-28 13:02:36,492 [PID 3382063] WARNING
2020-12-28 13:02:36,552 [PID 3382063] PERFORMANCE Expensive callables for iteration 1:
2020-12-28 13:02:36,585 [PID 3382063] INFO Iteration #1, 3038 callables, heap size 46521728 took 1.007461s
2020-12-28 13:02:36,585 [PID 3382063] INFO Iteration #2. 23 Callables [...]
2020-12-28 13:02:37,018 [PID 3382063] PERFORMANCE Expensive callables for iteration 2:
2020-12-28 13:02:37,018 [PID 3382063] INFO Iteration #2, 23 callables, heap size 46530432 took 0.432597s
2020-12-28 13:02:37,018 [PID 3382063] INFO Iteration #3. 2 Callables [integration_test.string_concatenation.bad_1 (fun), integration_test.string_concatenation.bad_2 (fun)]
2020-12-28 13:02:37,130 [PID 3382063] PERFORMANCE Expensive callables for iteration 3:
2020-12-28 13:02:37,131 [PID 3382063] INFO Iteration #3, 2 callables, heap size 46532352 took 0.113038s
2020-12-28 13:02:37,131 [PID 3382063] INFO Iteration #4. 0 Callables []
2020-12-28 13:02:37,131 [PID 3382063] INFO Fixpoint iterations: 4
2020-12-28 13:02:37,348 [PID 3382063] PERFORMANCE Analysis fixpoint complete: 3.037628s
2020-12-28 13:02:37,369 [PID 3382063] PERFORMANCE Analyze: 18.289002s