find_taint_sinks
Identify calls to dangerous sink methods in a repository using built-in and custom sinks for taint analysis.
Instructions
Find all calls to known dangerous sink methods in the given repository.
Uses the built-in sink registry (SQL, HTTP clients, exec) merged with any
custom sinks defined in ``~/.orihime/security.yml``. This is the custom
sources/sinks equivalent of SonarQube Enterprise's configurable taint rules.
Args:
repo_name: Repository to analyse.
Returns:
List of dicts with keys:
``caller_fqn``, ``sink_method``, ``file_path``, ``line_start``.Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| repo_name | Yes |
Output Schema
| Name | Required | Description | Default |
|---|---|---|---|
| result | Yes |