What tools are necessary for static-analysis taint-based vulnerability detection? For example, being able to find/search source-sink paths through a tainted variable, flexibility to choose flow sensitive/insensitive analysis, etc.
I realize there is no definitive answer, but that doesn't mean your answers are merely opinions; they are informed answers gleaned through application and practice.
Now I will have to wait for you to convince me this is somehow not open ended, and not opinion based. I'm trying to get the same pragmatic answers as that user. Is part of your status to as well help reformulate my question so it somehow becomes one that is valid, or merely to hit me over the head with bureaucracy?
– RiskyDiablo Feb 12 '23 at 23:22