Cette page n'est pas encore disponible en français, sa traduction est en cours. Si vous avez des questions ou des retours sur notre projet de traduction actuel, n'hésitez pas à nous contacter.
Never create a temporary file with a hardcoded path. Hardcoded paths may have write permissions for all users, enabling multiple types of attacks (for example, another application can also modify the temporary file and its content and potentially write executable code).
Always make sure temporary files are non deterministic and created programmatically.
classMyClass{publicstaticvoidpayloadDecode(){// Create the temporary file stream by getting programmatically a temporary path and filenamevartemporaryPath=Path.Combine(Path.GetTempPath(),Path.GetRandomFileName());// make sure you can create the file with write accessusingvartemporaryFileStream=newFileStream(randomPath,FileMode.CreateNew,FileAccess.Write,FileShare.None,4096,FileOptions.DeleteOnClose);using(varstreamWriter=newStreamWriter(temporaryFileStream)){streamWriter.WriteLine("foobar");}}}
Seamless integrations. Try Datadog Code Analysis
Datadog Code Analysis
Try this rule and analyze your code with Datadog Code Analysis
How to use this rule
1
2
rulesets:- csharp-security # Rules to enforce C# security.
Create a static-analysis.datadog.yml with the content above at the root of your repository
Use our free IDE Plugins or add Code Analysis scans to your CI pipelines