Skip to main content

Crate mir_extractor

Crate mir_extractor 

Source

Re-exports§

pub use dataflow::Assignment;
pub use dataflow::MirDataflow;

Modules§

dataflow
interprocedural
Inter-procedural taint analysis (Phase 3)
memory_profiler
Memory profiling utilities for debugging memory usage during analysis
rules
Security rules for Rust-cola static analysis.

Structs§

AnalysisResult
BroadcastUnsyncUsage
CacheConfig
CacheMetadata
CommandInvocation
ContentLengthAllocation
EnrichedPackage
Package with both MIR and source-level information
Exploitability
Exploitability metrics bundle (CVSS-like)
ExtractionArtifacts
Finding
FunctionFingerprint
LengthTruncationCast
MirFunction
MirFunctionHirMetadata
MirPackage
OpensslVerifyNoneInvocation
RuleEngine
RuleMetadata
SourceFile
Represents parsed source code for a Rust file
SourceSpan
SuppressionRule

Enums§

AttackComplexity
Attack complexity - conditions beyond attacker’s control
AttackVector
Attack vector - how the vulnerability can be exploited
CacheMissReason
CacheStatus
CodeContext
Code context classification for findings Used to categorize where a finding was detected, enabling filtering without data loss
Confidence
Confidence level for analysis findings
PrivilegesRequired
Privileges required to exploit the vulnerability
RuleOrigin
Severity
Severity levels for security findings (CVSS-aligned)
UserInteraction
Whether user interaction is required

Traits§

Rule

Functions§

analyze
analyze_with_engine
detect_broadcast_unsync_payloads
detect_command_invocations
detect_content_length_allocations
detect_openssl_verify_none
detect_truncating_len_casts
detect_unbounded_allocations
extract
extract_artifacts_with_cache
extract_span_from_mir_line
extract_with_cache
load_cached_analysis
sarif_report
store_cached_analysis
write_findings_json
write_mir_json
write_sarif_json