joern
joern copied to clipboard
[Bug] Joern-Scan Timeout Issue on PHP CVE Repositories
Overview
We encountered a significant issue while analyzing 312 PHP repositories containing vulnerabilities referenced in CVE reports using joern-scan. Despite setting a 2-hour timeout per repository, approximately 90% of the scans exceeded this limit, resulting in incomplete analyses.
Steps to Reproduce
- Download 312 PHP repositories with versions corresponding to CVE reports.
- Execute
joern-scanon each repository with a 2-hour timeout per analysis. - Observe that the majority of scans do not complete within the allocated time.
Expected Behavior
-
joern-scanshould complete the analysis within the 2-hour timeout per repository. - The tool should efficiently process PHP repositories without excessive runtime.
Observed Behavior
- ~90% of repositories exceed the timeout, leading to failed or incomplete analyses.
- No clear error messages explaining why the analysis takes longer than expected.
Questions for the Joern Team
-
Is this expected behavior?
- Should
joern-scantake this long for large PHP repositories?
- Should
-
Are there recommended configurations or additional arguments to optimize performance?
- Are there specific flags or memory settings that could help?
-
Does Joern have specific best practices for scanning large PHP projects?
- Should we preprocess the repositories before running
joern-scan?
- Should we preprocess the repositories before running
System Information
- Joern Version: 91e69dfc6617bc924ed899aadedfffaefed8096c
- Java Version: Java 21-tem
- OS: Ubuntu 20.04 LTS