progpilot
Static security analyzer for PHP code
TLDR
SYNOPSIS
progpilot [--configuration file] [--json] [--output file] [options] files
DESCRIPTION
progpilot performs static security analysis on PHP code by tracing the flow of user-controlled data through the application. It uses taint analysis to identify points where unsanitized input reaches dangerous functions such as database queries, shell commands, or HTML output, flagging potential SQL injection, XSS, command injection, and path traversal vulnerabilities.
The analysis works by modeling sources (where user input enters), sinks (where dangerous operations occur), and sanitizers (functions that neutralize tainted data). All three are configurable through a YAML configuration file, allowing teams to define custom security rules, add application-specific sensitive functions, and suppress false positives.
Output includes the vulnerability type, file location, and affected code path. JSON output mode enables integration with CI/CD pipelines for automated security checks during development.
PARAMETERS
--configuration FILE
YAML config file.--json
JSON output format.--output FILE
Output file.-v, --verbose
Verbose output.--include PATH
Include path.--exclude PATH
Exclude path.--help
Show help.
CONFIGURATION
progpilot.yml (or custom path via --configuration)
YAML configuration file defining sources, sinks, sanitizers, include/exclude paths, and custom vulnerability rules for the analysis.
VULNERABILITIES DETECTED
SQL Injection - Database query manipulation
XSS - Cross-site scripting
Code Injection - Arbitrary code execution
Path Traversal - File access outside root
Command Injection - Shell command execution
CAVEATS
Static analysis has false positives. Complex code paths may be missed. PHP version coverage varies.
HISTORY
progpilot was created for PHP security auditing. It uses static taint analysis to identify security vulnerabilities in web applications.

