You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 

101 lines
9.3 KiB

  1. <?xml version="1.0" encoding="utf-8"?>
  2. <?xml-stylesheet type="text/xsl" href="c:\program files (x86)\microsoft visual studio 14.0\team tools\static analysis tools\fxcop\Xml\CodeAnalysisReport.xsl"?>
  3. <FxCopReport Version="14.0">
  4. <Targets>
  5. <Target Name="C:\Users\Administrator\Desktop\NTFSSecurity\Bin\Debug\Net452\AlphaFS.dll">
  6. <Modules>
  7. <Module Name="alphafs.dll">
  8. <Messages>
  9. <Message TypeName="AssembliesShouldHaveValidStrongNames" Category="Microsoft.Design" CheckId="CA2210" Status="Active" Created="2016-10-06 12:29:23Z" FixCategory="NonBreaking">
  10. <Issue Name="NoStrongName" Certainty="95" Level="CriticalError">Sign 'AlphaFS.dll' with a strong name key.</Issue>
  11. </Message>
  12. </Messages>
  13. <Namespaces>
  14. <Namespace Name="Alphaleonis.Win32.Filesystem">
  15. <Types>
  16. <Type Name="Path" Kind="Class" Accessibility="Public" ExternallyVisible="True">
  17. <Members>
  18. <Member Name="#GetFinalPathNameByHandleCore(Microsoft.Win32.SafeHandles.SafeFileHandle,Alphaleonis.Win32.Filesystem.FinalPathFormats)" Kind="Method" Static="True" Accessibility="Assembly" ExternallyVisible="False">
  19. <Messages>
  20. <Message TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122" Status="Active" Created="2016-10-06 12:29:23Z" FixCategory="NonBreaking">
  21. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Path Class" File="Path.GetFinalPathNameByHandle.cs" Line="76">'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)' calls into 'Process.GetCurrentProcess()' which has a LinkDemand. By making this call, 'Process.GetCurrentProcess()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  22. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Path Class" File="Path.GetFinalPathNameByHandle.cs" Line="76">'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)' calls into 'Process.GetCurrentProcess()' which has a LinkDemand. By making this call, 'Process.GetCurrentProcess()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  23. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Path Class" File="Path.GetFinalPathNameByHandle.cs" Line="76">'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)' calls into 'Process.Handle.get()' which has a LinkDemand. By making this call, 'Process.Handle.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle)'</Issue>
  24. <Issue Certainty="33" Level="CriticalError" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Path Class" File="Path.GetFinalPathNameByHandle.cs" Line="76">'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)' calls into 'Process.Handle.get()' which has a LinkDemand. By making this call, 'Process.Handle.get()' is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: &#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandleCore(SafeFileHandle, FinalPathFormats)'&#xD;&#xA; -&gt;'Path.GetFinalPathNameByHandle(SafeFileHandle, FinalPathFormats)'</Issue>
  25. </Message>
  26. </Messages>
  27. </Member>
  28. <Member Name="#NormalizePath(System.String,Alphaleonis.Win32.Filesystem.GetFullPathOptions)" Kind="Method" Static="True" Accessibility="Private" ExternallyVisible="False">
  29. <Messages>
  30. <Message TypeName="AvoidExcessiveLocals" Category="Microsoft.Performance" CheckId="CA1809" Status="Active" Created="2016-10-06 12:29:23Z" FixCategory="NonBreaking">
  31. <Issue Name="Compiler" Certainty="95" Level="Warning" Path="C:\Users\Administrator\Desktop\NTFSSecurity\AlphaFS\Filesystem\Path Class" File="Path.ValidationAndChecks.cs" Line="294">'Path.NormalizePath(string, GetFullPathOptions)' has 71 local variables, 47 of which were generated by the compiler. Refactor 'Path.NormalizePath(string, GetFullPathOptions)' so that it uses fewer than 64 local variables.</Issue>
  32. </Message>
  33. </Messages>
  34. </Member>
  35. </Members>
  36. </Type>
  37. </Types>
  38. </Namespace>
  39. </Namespaces>
  40. </Module>
  41. </Modules>
  42. </Target>
  43. </Targets>
  44. <Rules>
  45. <Rule TypeName="AssembliesShouldHaveValidStrongNames" Category="Microsoft.Design" CheckId="CA2210">
  46. <Name>Assemblies should have valid strong names</Name>
  47. <Description>Either the assembly has no strong name, an invalid one, or the strong name is valid only because of the computer configuration. The assembly should not be deployed in this state. The most common causes of this are: 1) The assembly's contents were modified after it was signed. 2) The signing process failed. 3) The assembly was delay-signed. 4) A registry key existed that allowed the check to pass (where it would not have otherwise).</Description>
  48. <Resolution Name="NoStrongName">Sign {0} with a strong name key.</Resolution>
  49. <Owner />
  50. <Url>http://msdn.microsoft.com/library/ms182127.aspx</Url>
  51. <Email>[none]</Email>
  52. <MessageLevel Certainty="95">CriticalError</MessageLevel>
  53. <File Name="designrules.dll" Version="14.0.0.0" />
  54. </Rule>
  55. <Rule TypeName="AvoidExcessiveLocals" Category="Microsoft.Performance" CheckId="CA1809">
  56. <Name>Avoid excessive locals</Name>
  57. <Description>Method implementations should not contain more than 64 local variables. In order for the run-time to enregister local variables most efficiently, there should be 64 or fewer of them. Enregistering based on flow analysis will not occur for locals in excess of 64, which may result in slower performance.</Description>
  58. <Resolution Name="Compiler">{0} has {1} local variables, {2} of which were generated by the compiler. Refactor {0} so that it uses fewer than 64 local variables.</Resolution>
  59. <Owner />
  60. <Url>http://msdn.microsoft.com/library/ms182263.aspx</Url>
  61. <Email>[none]</Email>
  62. <MessageLevel Certainty="95">Warning</MessageLevel>
  63. <File Name="performancerules.dll" Version="14.0.0.0" />
  64. </Rule>
  65. <Rule TypeName="DoNotIndirectlyExposeMethodsWithLinkDemands" Category="Microsoft.Security" CheckId="CA2122">
  66. <Name>Do not indirectly expose methods with link demands</Name>
  67. <Description>Do not wrap a method protected by a LinkDemand with a method that does not perform a security check. A LinkDemand checks the permissions of the immediate caller rather than checking the permissions of all callers in the call stack. In this case, the permissions of the wrapper method will be checked. If the wrapper method does not, itself, check the permissions of callers higher in the call stack, malicious code might be able to execute the wrapped function even though it lacks permission to do so.</Description>
  68. <Resolution Name="Default">{0} calls into {1} which has a LinkDemand. By making this call, {1} is indirectly exposed to user code. Review the following call stack that might expose a way to circumvent security protection: {2}</Resolution>
  69. <Owner />
  70. <Url>http://msdn.microsoft.com/library/ms182303.aspx</Url>
  71. <Email>[none]</Email>
  72. <MessageLevel Certainty="33">CriticalError</MessageLevel>
  73. <File Name="securityrules.dll" Version="14.0.0.0" />
  74. </Rule>
  75. </Rules>
  76. <Localized>
  77. <String Key="Category">Category</String>
  78. <String Key="Certainty">Certainty</String>
  79. <String Key="CollapseAll">Collapse All</String>
  80. <String Key="CheckId">Check Id</String>
  81. <String Key="Error">Error</String>
  82. <String Key="Errors">error(s)</String>
  83. <String Key="ExpandAll">Expand All</String>
  84. <String Key="Help">Help</String>
  85. <String Key="Line">Line</String>
  86. <String Key="Messages">message(s)</String>
  87. <String Key="LocationNotStoredInPdb">[Location not stored in Pdb]</String>
  88. <String Key="Project">Project</String>
  89. <String Key="Resolution">Resolution</String>
  90. <String Key="Rule">Rule</String>
  91. <String Key="RuleFile">Rule File</String>
  92. <String Key="RuleDescription">Rule Description</String>
  93. <String Key="Source">Source</String>
  94. <String Key="Status">Status</String>
  95. <String Key="Target">Target</String>
  96. <String Key="Warning">Warning</String>
  97. <String Key="Warnings">warning(s)</String>
  98. <String Key="ReportTitle">Code Analysis Report</String>
  99. </Localized>
  100. </FxCopReport>