Ocular Script Templates

Ocular Script Templates

The power of ShiftLeft Ocular is customization, which increases accuracy and helps find vulnerabilities that are unique to your code base such as business logic flaws. ShiftLeft provides Ocular script templates to help customers get started.

Script Name Use Case
CI/CD Technical vulnerabilities detection Automates Ocular in CI/CD environment, Analyzes for technical vulnerabilities (OWASP Top 10 and other) and outputs the results in Jenkins in JSON format
CI/CD Scripts automation Automates Ocular in CI/CD environment, Analyzes for custom scripts and outputs the results in Jenkins in JSON format
Script Name Use Case
GDPR compliance This script will run all tests to detect whether your code is compliant to GDPR from a data leak perspecitve, and generate a report
Access Token/Secret leaks Detects hard-coded secrets such as AWS Keys, passwords etc.
PII Leaks to emails Detect personally identifiable inforamtion (PII) leaking to emails
PII Leaks to logs Detect personally identifiable inforamtion (PII) leaking to system and user logs
PII Leaks to disk/files Detect personally identifiable inforamtion (PII) leaking to disk/files
Weak Crypto detection Detect usage of weak cryptographic libraries in the application
Script Name Use Case
Generic attack surface detection Identifies Application entry points that can be compromised
Attack surface detection for Burp Identifies Application entry points in a Burp compliant format
Script Name Use Case
Authorization bypass Detect flows when authorization is not happening post authentication
Cookie poisioning Identify if HTTP cookies are being maliciously or inadvarently modified by attacker controlled values or in program logic itself
Insecure Direct Object Reference (IDOR) Identify locations in application where attacker controlled objects are used in critical operations such as database operations without any checks
Script Name Use Case
Malicious String Literals Identify string literals and their locations in code which may contain malicious patterns (may/may not be encoded)
Kernel Panic code Identify code and their locations in the codebase which may cause kernel panic
Malicious Permission manipulation Identify code and their locations in the codebase which change system permissions
Malicious system commands execution Identify code and their locations in the codebase which can cause malicious code to execude
Malicious File manipulation code Identify code and their locations in the codebase which can manipulate files maliciously
Malicious Disk manipulation code Identify code and their locations in the codebase that manipulate disk on the system
Script Name Use Case
Compiler abuse Detect if dynamic code is loaded/compile
Time bomb/logic bomb Detect if logic/time bombs are triggered at scheduled intervals that can distrupt operations
DDos Attack path Detect paths in application that can detect Denial of Service attack
Detect encoded malicious code modules Rootkits planted by malicious and disgruntled employees that can be triggered/scheduled to be executed
Secret input detection Detect backdoors planted by engineers to bypass complaince and auditing
Detect Reflection abuse (for RCE) Ability to execute arbritray commands that can be compiled/executed by attacker controlled input
Detect SSRF symptoms (Capital One use case) Detect Server Side Request Forgery conditions
Detect security misconfiguration Hardcoded database URIs, etc in code
Script Name Use Case
Identify Class Hierarchy Investigate relationship between derived classes to understand application behavior
Enumerate modifiers in Java Verify if access modifiers of members of a class are in accordance with secure coding practices
Identify Call Chains Identify call chains in the software; Where the data is coming from, Can the software be controlled?