...
Tool | Version | Checker | Description | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
Astrée |
| Supported, but no explicit checker | |||||||||
Clang |
| cert-env33-c | Checked by clang-tidy | ||||||||
CodeSonar |
| BADFUNC.PATH.SYSTEM | Use of system | ||||||||
Compass/ROSE | |||||||||||
Coverity |
| DONT_CALL | Implemented | ||||||||
Klocwork |
| MISRA.STDLIB.ABORT | |||||||||
LDRA tool suite |
| 588 S | Fully implemented | ||||||||
Parasoft C/C++test |
| SECURITY-48, MISRA2004-20_11 | Also detects getenv(), abort(), and exit() | ||||||||
Polyspace Bug Finder |
R2016a R2017b | Execution of externally controlled command | Command argument from an unsecure source vulnerable to operating system command injection Path argument from an unsecure source Unsanitized command argument has exploitable vulnerabilities | ||||||||
PRQA QA-C |
| 5018 | Partially implemented | ||||||||
PRQA QA-C++ |
| 5031 | |||||||||
RuleChecker |
| Supported, but no explicit checker | |||||||||
SonarQube C/C++ Plugin |
| S990 | Detects uses of "abort", "exit", "getenv" and "system" from <stdlib.h> |
...