FF117 Audit
General
The audit begins at the commit hash where the previous audit ended. Use code_audit.sh for creating the diff and highlighting potentially problematic code. The audit is scoped to a specific language (currently C/C++, Rust, Java/Kotlin, and Javascript).
The output includes the entire patch where the new problematic code was introduced. Search for XXX MATCH XXX
to find the next potential violation.
code_audit.sh
contains the list of known problematic APIs. New usage of these functions are documented and analyzed in this audit.
https://github.com/mozilla/gecko-dev.git
Firefox:- Start: ff486626d0de0e7f34d65ef000c657080ddf564d (
FIREFOX_116_0_3_RELEASE
) - End: 6f3830e39c76ae6d0ab19b4f9289d434d424cbe3 (
FIREFOX_117_0_RELEASE
)
Languages:
-
java -
cpp -
js -
rust
Nothing of interest (using code_audit.sh
)
OR
foreach PROBLEMATIC_HASH:
$(PROBLEMATIC_HASH)
- Summary
- Review Result: (SAFE|BAD)
https://github.com/mozilla/application-services.git
Application Services:- Start:
$(FIRST_GIT_HASH)
($(START_TAG)
) - End:
$(LAST_GIT_HASH)
($(END_TAG)
)
Languages:
-
java -
cpp -
js -
rust
Nothing of interest (using code_audit.sh
)
OR
foreach PROBLEMATIC_HASH:
$(PROBLEMATIC_HASH)
- Summary
- Review Result: (SAFE|BAD)
Export
-
Export Report and save to tor-browser-spec/audits
Edited by morgan