Source code management method for malicious code detection
First Claim
1. A method in a data processing system for autonomically detecting malicious source code prior to executing a software product build, the method comprising:
- responsive to receiving source code from a set of software developers in a collaborative development environment, moving the source code to a staging area;
determining whether the source code in the staging area contains malicious code; and
responsive to a determination that malicious code exists, removing the source code from the software product build.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for enhancing source code management by using existing virus detection methods in a library management system to detect potentially malicious code. With the mechanism of the present invention, malicious code that is introduced into a software product may be detected before the code is able to damage stored data and other software by preventing a product build with the destructive code. When source code is received at a code management library system from a set of software developers in a collaborative development environment, the source code is moved into a staging area. A determination is then made as to whether malicious code exists in the source code. If malicious code exists, the library system removes the source code from the software product build and notifies the system administrator of the presence of malicious code.
-
Citations
20 Claims
-
1. A method in a data processing system for autonomically detecting malicious source code prior to executing a software product build, the method comprising:
-
responsive to receiving source code from a set of software developers in a collaborative development environment, moving the source code to a staging area;
determining whether the source code in the staging area contains malicious code; and
responsive to a determination that malicious code exists, removing the source code from the software product build. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A code management library system for autonomically detecting malicious source code prior to executing a software product build, comprising:
-
a staging area, wherein the source code holds the source code received from a set of software developers in a collaborative development environment;
a build machine for performing the software product build; and
a detection engine, wherein the detection engine determines whether the source code in the staging area contains malicious code and removes the source code from the software product build in response to determining that malicious code exists. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product in a computer readable medium for autonomically detecting malicious source code prior to executing a software product build, comprising:
-
first instructions for moving source code to a staging area in response to receiving the source code from a set of software developers in a collaborative development environment;
second instructions for determining whether the source code in the staging area contains malicious code; and
third instructions for removing the source code from the software product build in response to a determination that malicious code exists. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification