...
Tool | Version | Checker | Description | ||||||
|---|---|---|---|---|---|---|---|---|---|
| Astrée |
| stdlib-use-system | Fully checked | ||||||
| Axivion Bauhaus Suite |
| CertC-ENV33 | |||||||
| Clang |
| cert-env33-c | Checked by clang-tidy | ||||||
| CodeSonar |
| BADFUNC.PATH.SYSTEM | Use of system | ||||||
| Compass/ROSE | |||||||||
| Coverity |
| DONT_CALL | Implemented | ||||||
| Cppcheck Premium |
| premium-cert-env33-c | Fully implemented | ||||||
| Helix QAC |
| C5018 C++5031 | |||||||
| Klocwork |
| SV.CODE_INJECTION.SHELL_EXEC | |||||||
| LDRA tool suite |
| 588 S | Fully implemented | ||||||
| Parasoft C/C++test |
| CERT_C-ENV33-a | Do not call the 'system()' function from the 'stdlib.h' or 'cstdlib' library with an argument other than '0' (null pointer) | ||||||
| PC-lint Plus |
| 586 | Fully supported | ||||||
| Polyspace Bug Finder |
| Checks for unsafe call to a system function (rule fully covered) | |||||||
| RuleChecker |
| stdlib-use-system | Fully checked | ||||||
| SonarQube C/C++ Plugin |
| S990 | Detects uses of "abort", "exit", "getenv" and "system" from <stdlib.h> |
Related Vulnerabilities
Search for vulnerabilities resulting from the violation of this rule on the CERT website.
...