A static analysis tool that detects Common Weakness Enumerations (CWEs) in binary executables across multiple CPU architectures.
cwe_checker is a suite of static analysis checks designed to detect common bug classes and vulnerabilities in binary executables. It focuses on ELF binaries commonly found on Linux and Unix systems, making it a valuable tool for firmware analysis and security auditing. The tool uses Ghidra to disassemble binaries into a common intermediate representation, enabling analysis across various CPU architectures like x86, ARM, MIPS, and PPC.
Security analysts and firmware reverse engineers who need to quickly identify potentially vulnerable code paths in binary executables, particularly those working with embedded systems or Linux/Unix binaries.
Developers choose cwe_checker for its multi-architecture support through Ghidra integration, extensive CWE coverage with configurable analyses, and easy setup via Docker. Its plugin-based architecture and ability to annotate results directly in Ghidra streamline the security auditing workflow.
cwe_checker finds vulnerable patterns in binary executables
Leverages Ghidra to disassemble and analyze ELF binaries across x86, ARM, MIPS, and PPC, making it versatile for embedded firmware and cross-platform security audits.
Implements checks for over 15 CWEs including buffer overflows, use-after-free, and integer overflows, providing broad coverage of common vulnerability classes as listed in the README.
Offers pre-built Docker images for quick setup, with the README highlighting that it is 'very easy to set up, just build the Docker container!' for consistent environments.
Includes a script to annotate findings directly in Ghidra, streamlining manual reverse engineering by visualizing CWE warnings in the disassembler interface.
Primarily supports ELF binaries common in Linux/Unix systems, excluding other executable formats like Windows PE, which restricts its use in heterogeneous environments.
The README explicitly states that 'false positives and false negatives are to be expected,' reducing reliability for precision-critical security validation.
Local installation requires Ghidra, a large Java-based tool, adding complexity and potential compatibility issues compared to lightweight standalone analyzers.
Dex to Java decompiler
Find secrets with Gitleaks 🔑
UNIX-like reverse engineering framework and command-line toolset
Firmware Analysis Tool
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.