> On Sep 14, 2015, at 1:35 PM, Kalle Sommer Nielsen <ka...@php.net> wrote: > > Hi Christopher > > 2015-09-14 4:44 GMT+02:00 Christopher Owen <christopher.o...@live.com>: >> Please consider making ‘taint’ a first-class feature/extension in PHP 7.0. > > It is way too late for any extension to be included in the 7.0 release > now, but you can write an RFC targetting 7.1, please see the wiki for > more details[1].
Thank you for the advice; it makes much more sense to target 7.1. We can see that Wietse Venema; the same man who wrote the highly regarded, security hardened email software Postfix; has authored an RFC for taint's inclusion to PHP the past [1]. Also, a reference implementation has been most recently championed by Xinchen (Laruence) Hui, a core php developer [2]. Given those that came before me, I’m not certain that I can add much in the way of reputation or skill to the request to add taint as a first-class feature of PHP 7.1, but if there are any procedural efforts required then I will be happy to champion them. I can add that I have personally found taint (either in its original form in perl[3] or as an extension in php) a valuable tool in refactoring legacy php code to reduce SQL injection attack surface. As authorative internet ‘top ten’ lists will list SQL injection as the number one security vulnerability facing web applications [4] and given the scale of deployed php, efforts to improve tooling (or in this case, the availability of existing tooling) to discover this class of vulnerabilities will have a positive impact on a global scale. Kind regards, Christopher Owen. [1] https://wiki.php.net/rfc/taint <https://wiki.php.net/rfc/taint> [2] http://pecl.php.net/package/taint <http://pecl.php.net/package/taint> [3] http://perldoc.perl.org/perlsec.html#Taint-mode <http://perldoc.perl.org/perlsec.html#Taint-mode> [4] http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf <http://owasptop10.googlecode.com/files/OWASP%20Top%2010%20-%202013.pdf>