Loading...
Loading...
Run Psalm with taint analysis on PHP code. Detects SQL injection, XSS, command injection, path traversal, and other taint-flow vulnerabilities in PHP applications.
npx skill4agent add vchirrav/owasp-secure-coding-md sast-psalmcomposer require --dev vimeo/psalm./vendor/bin/psalm --init./vendor/bin/psalm --version./vendor/bin/psalm --taint-analysis --output-format=json > psalm-results.json./vendor/bin/psalm --taint-analysis src/ --output-format=json./vendor/bin/psalm --taint-analysis --level=1 --output-format=json./vendor/bin/psalm --taint-analysis --show-info=true --output-format=json| # | Severity | Type | File:Line | Finding | Taint Flow | Remediation |
|---|----------|------|-----------|---------|------------|-------------|| Taint Type | Risk |
|---|---|
| TaintedSql | SQL injection via unsanitized input |
| TaintedHtml | XSS via unescaped output |
| TaintedShell | Command injection |
| TaintedFile | Path traversal |
| TaintedHeader | HTTP header injection |
| TaintedSSRF | Server-side request forgery |
| TaintedUnserialize | Insecure deserialization |
| TaintedInclude | Remote/local file inclusion |
| TaintedEval | Code injection via eval |
| TaintedLdap | LDAP injection |