Business logic attacks are a class of attack that targets the business logic of an application, specifically where developers may be prone to making errors. Errors in business logic can be devastating to an entire application. They can be difficult to find automatically, since they typically involve legitimate use of the application's functionality. However, many business logic flaws can exhibit patterns that are similar to well-understood implementation and design weaknesses.
Ocular provides a customizable Read Eval Print Loop (REPL) approach to iteratively interrogating code. Analysts with more sophisticated code exploration needs, can leverage the comprehensive CPG graphical mapping to create highly specific and targeted queries, bypassing common sources of false positives. Examples include the ability to identify any custom sanitizations present in the code, where user input is properly secured, and the presence of any indirect data flows, where user input is not directly used in a sink.
Ocular queries accelerate the process of examining the various software elements and flows to identify complex business logic vulnerabilities, that can't be scanned for automatically, such as PII that goes unencrypted at rest, abuse of functionality, insufficient process validation, and other common examples as defined by the OWASP
Ocular query results are available and exportable via standard JSON format for easy integration into the security tools in use by the organization,and for sharing data across the SDLC.
Analogous to the way Google Maps provides a representation of your unique geographical location, the various routes available and possible destinations, ShiftLeft Ocular provides code auditors and reviewers with a platform to construct, and tune powerful, highly customized queries for interactive interrogation of their unique code bases and environments.
Get started with your free trial today!FREE TRIAL