科技美学

  博客园  :: 首页  :: 新随笔  :: 联系 :: 订阅 订阅  :: 管理

1.0 PHPStan

image

PHPStan: Find Bugs Without Writing Tests

https://phpstan.org/

sudo docker pull ghcr.io/phpstan/phpstan:2-php8.3
sudo docker run --rm -v /home/user/dbpower/app:/app ghcr.io/phpstan/phpstan:2-php8.3 analyse /app > phpstan-results.txt

  鏡像跑。https://phpstan.org/user-guide/docker

sudo docker run --rm -v /home/user/dbpower/app:/app ghcr.io/phpstan/phpstan:2-php8.3 analyse /app --level max > phpstan-result.txt

  lv10

parameters:
  ignoreErrors:
    - '#Function .*? not found#'
    - '#Cannot access property .*? on mixed#'
    - '#Part .*? \(mixed\) of encapsed string cannot be cast to string#'
    - '#Cannot access offset .*? on mixed#'

  phpstan.neon

cd /home/user/dbpower
sudo docker run --rm -v /home/user/dbpower/app:/app ghcr.io/phpstan/phpstan:2-php8.3 analyse -c phpstan.neon /app --level max > phpstan-result-`date +\%Y\%m\%d_\%H\%M\%S`.txt

  lv10 with config, ignore errors

cd /home/user/dbpower
sudo docker run --rm -v /home/user/dbpower/app:/app ghcr.io/phpstan/phpstan:2-php8.3 analyse --error-format=table -c phpstan.neon /app --level max > phpstan-result-`date +\%Y\%m\%d_\%H\%M\%S`.txt

  output format = table

cd /home/user/dbpower
sudo docker run --rm -v /home/user/dbpower/app:/app ghcr.io/phpstan/phpstan:2-php8.3 analyse --error-format=json -c phpstan.neon /app --level max > phpstan-result-`date +\%Y\%m\%d_\%H\%M\%S`.json

  output format = json

2.0 RIPS

image

RIPS - A static source code analyser for vulnerabilities in PHP scripts
https://github.com/ripsscanner/rips

sudo docker pull gsfish/rips-docker
sudo docker run -d --rm -p 83:80 -v /home/user/dbpower/app:/target gsfish/rips-docker

  鏡像跑。https://github.com/gsfish/rips-docker

 

posted on 2025-07-24 16:26  chankuang  阅读(11)  评论(0)    收藏  举报