# taint **Repository Path**: lujunjian/taint ## Basic Information - **Project Name**: taint - **Description**: No description available - **Primary Language**: Unknown - **License**: Not specified - **Default Branch**: master - **Homepage**: None - **GVP Project**: No ## Statistics - **Stars**: 0 - **Forks**: 0 - **Created**: 2020-06-28 - **Last Updated**: 2020-12-19 ## Categories & Tags **Categories**: Uncategorized **Tags**: None ## README # Taint [![Build Status](https://secure.travis-ci.org/laruence/taint.png)](http://travis-ci.org/laruence/taint) [![Build status](https://ci.appveyor.com/api/projects/status/69ucxc2pwx333s3j/branch/master?svg=true)](https://ci.appveyor.com/project/laruence/taint/branch/master) php extension used to detect XSS codes(tainted string), And also can be used to spot sql injection vulnerabilities, shell inject, etc. The idea is from https://wiki.php.net/rfc/taint, I implemented it in a php extension which make the patch no-needed. Please note that do not enable this extension in product env, since it will slowdown your app. ## Requirement - PHP-5.2 + ## Install taint is an PECL extension, thus you can simply install it by: ```` pecl install taint ```` ### Compile taint in Linux ```` $/path/to/phpize $./configure --with-php-config=/path/to/php-config/ $make && make install ```` ### Usage When taint is enabled, if you pass a tainted string(comes from $_GET, $_POST or $_COOKIE) to some functions, taint will warn you about that. ````php