mediawiki/phan-taint-check-plugin
Phan plugin for detecting taint-based security issues in PHP, including XSS, SQL and shell injection, and unsafe serialization. Tracks user-controlled data and checks it’s escaped before output or queries; supports generic PHP and MediaWiki-specific analysis.
Architecture fit: Strong for projects already using Phan, especially MediaWiki. Generic PHP support requires configuration but is feasible.
Integration feasibility: High for existing Phan users (minimal config changes), moderate for new projects (requires Phan adoption).
Technical risk: High false positives (e.g., SecurityCheck-PHPSerializeInjection), limitations in subclass data flow tracking, reliance on manual annotations for custom escaping logic.
Key questions: How will false positives be managed in CI without masking real issues? What expertise exists for configuring Phan and taint annotations? Are there custom escaping functions requiring explicit documentation? How does this complement existing security tools (e.g., SAST/DAST)?
Stack fit: Compatible with PHP 8.1+, Composer, and Phan 6.0.2+. Native support for MediaWiki; generic PHP requires explicit configuration. No external dependencies beyond PHP extensions.
Migration path: For existing Phan users, integrate via config additions; for new projects, first adopt Phan before adding plugin. Initial scans should focus on high-risk areas before full coverage.
Compatibility: Requires Phan as a dependency; compatible with most PHP projects but may need adjustments for custom code structures.
Sequencing: 1. Install and configure Phan. 2. Add plugin to config with quick_mode disabled. 3
How can I help you explore Laravel packages today?