soyo114
soyo114
**Describe the bug** Semgrep throwss syntax errors when parsing following code by using `semgrep scan`. ```rust trait CipherProvider {} fn process_cipher(data: &(impl CipherProvider + ?Sized)) { // report syntax error...
I encounter a false positive UseAfterFree warning in LockBud. The reported UAF warning should not occur in practice because Rust's Arc mechanism already provides guaranteed memory safety. Below is a...
## Description The false positive occurs because the detector fails to account for the semantics of `drop`. Below is a minimized reproduction case. Lockbud should not report `DoubleLock` warning as...
## Description Prusti throws an internal error when analyze the following code, it seems that the root cause is related to the Rust closure. ```rust fn main() { let c...
In the following code example, Rudra should have reported two unsafe dataflow warnings at lines 5 and 11. The false negative appears to be related to the trait bound, as...
## Description Hi, when using LockBud to detect `ConflictLock` vulnerabilities, I found that it generates some duplicate warnings. Please see the code example and the analysis results below. I used...
## Description Hi, I found a false negative about the CondvarDeadlock vulnerability detection when using lockbud. The minmized code example is provided below. Lockbud should report a **CondvarDeadlock** warning. The...
The overflow detection module in MirChecker may produce incorrect results when analyzing `if-else` code blocks, as it reports an obvious false positive. Below is a minimized code example demonstrating the...
MirChecker panics in the following code example when the constant IS_LOCKED is passed as an argument to any function (here, using foo() as an example). ```rust const IS_LOCKED: usize =...