Polyglot Code Smell Detection for Infrastructure as Code with GLITCH

08/18/2023
by   Nuno Saavedra, et al.
0

This paper presents GLITCH, a new technology-agnostic framework that enables automated polyglot code smell detection for Infrastructure as Code scripts. GLITCH uses an intermediate representation on which different code smell detectors can be defined. It currently supports the detection of nine security smells and nine design implementation smells in scripts written in Ansible, Chef, Docker, Puppet, or Terraform. Studies conducted with GLITCH not only show that GLITCH can reduce the effort of writing code smell analyses for multiple IaC technologies, but also that it has higher precision and recall than current state-of-the-art tools. A video describing and demonstrating GLITCH is available at: https://youtu.be/E4RhCcZjWbk

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/28/2022

GLITCH: an Intermediate-Representation-Based Security Analysis for Infrastructure as Code Scripts

Infrastructure as Code (IaC) is the process of managing IT infrastructur...
research
06/29/2019

Infrastructure-Agnostic Hypertext

This paper presents a novel and formal interpretation of the original vi...
research
08/17/2021

Infrastructure in Code: Towards Developer-Friendly Cloud Applications

The popularity of cloud technologies has led to the development of a new...
research
06/21/2022

Static Analysis of Infrastructure as Code: a Survey

The increasing use of Infrastructure as Code (IaC) in DevOps leads to be...
research
03/22/2021

RefactorHub: A Commit Annotator for Refactoring

It is necessary to gather real refactoring instances while conducting em...
research
08/29/2018

Towards security defect prediction with AI

In this study, we investigate the limits of the current state of the art...
research
11/04/2019

Adapting a Container Infrastructure for Autonomous Vehicle Development

In the field of Autonomous Vehicle (AV) development, having a robust yet...

Please sign up or login with your details

Forgot password? Click here to reset