-
Notifications
You must be signed in to change notification settings - Fork 382
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rule request: AvoidSecureStringDisclosure
#1997
Comments
AvoidUsingConvertFromSecureStringToPlainText
AvoidSecureStringLeaks
AvoidSecureStringLeaks
AvoidSecureStringDisclosure
Thanks @iRon7 , we would want more comments here on the plan for implementation and design open for community discussion before opening a PR. We don't have any plans to open rules along these lines at this time but have left it up for grabs. |
The thing with a
Bottom line; the best way to handle a |
As for AvoidUsingConvertToSecureStringWithPlainText it should be avoided to retrieve a PlainText password from a
SecureString
as it might leave memory trials (or even logging trails).This will also include the common used statements as:
(see: https://stackoverflow.com/a/28353003/1701026)
and (see: https://stackoverflow.com/a/40166959/1701026):
The general approach of dealing with credentials is to avoid them and instead rely on other means to authenticate, such as certificates or Windows authentication.
Proposed technical implementation details (optional)
Create rules to check for the above mentioned unsafe statements.
The text was updated successfully, but these errors were encountered: