-
Notifications
You must be signed in to change notification settings - Fork 517
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New check: Check for vulnerabilities in your dependency trees #1508
Comments
I agree. If we are going down the rabbit hole of the dependency tree why just look into Vulns alone. What about the health of the transitive dependency tree? We already have this Scorecard data in our BigQuery. The steps involved are dependency tree and getting scorecard data from BigQuery for each of the dependencies. shameless plug I built this to identify the scorecard for all the |
@naveensrinivasan - the problem is we need something to work across languages. go is easy, we need to support atleast a few more ecosystems. |
Note that BQ table contains the scorecard's repo data, but the missing link is package version/hash. I don't think we can use BQ table because of that, and the data must come from another source. We can potentially query each ecosystem's database ourselves, but this still requires us to parse the manifest file... If OSI API is available, that's the way to go. Otherwise we should consider creating a service that runs existing ecosystem's tools like pip-audit, cargo-audit, and expose the results via an API. |
I agree. But I think we should scope it as not just Vulns that was the point. |
ah that, that i totally agree, it could be even aggregate scorecard calc on deps too instead of just vulns |
I agree with Naveen. I think finding transitive dependencies (and scoring them) shouldn't be a Scorecard check. Instead, I think we should aim to partner with someone like Open Source Insights or an SBOM generation tool and plug our Scorecard result in their output dependency tree. The biggest advantage being, this will allow a tool like AllStar to apply fine-grained and complex policies on not just the repo itself but also on its dependencies. |
AllStar is specific to GitHub and Scorecard would eventually not be specific to GitHub. AllStar is a not CLI tool that everyone can consume. |
another angle for this is that scorecard has complementary information to OSI's data: we look at workflows, shell scripts, makefiles (soon), GCB config (soon), so we could also build and expose this data "dependencies in CICD", which is useful during incidence response and that nobody is really looking into atm. I suppose this would even be useful in the context of criticality score. |
So are you in favor of having the check as part of scorecard? |
I agree! 👍 |
related https://blog.trailofbits.com/2021/12/16/it-depends/ cc @rarkins |
I had a quick look at the repo for parsing |
|
@spencerschrock - I think you said that the original "vulnerabilities" check has been addressed via the use of OSV-scanner? In which case this might be closed (with aggregation for additional checks being a separate issue)? I figured out that the issues I was seeing were likely in OSV-Scanner (416 and 332). Edit: (These issues were the reason the check didn't seem to be working in a very specific example I was looking at) Edit2: If it needs to remain open, this is probably something I can/should help with (depending on why it needs to remain open) |
Agreed. Sorry for the delayed response. |
Is your feature request related to a problem? Please describe.
Right now, vulnerabilities check gives vulns in the package itself, but does not say anything about known vulns in its deps tree.
Describe the solution you'd like
Either use Open Source Insights api or something similar, to create a new check DepsVulns and provide information on known vuln in the deps.
Describe alternatives you've considered
NA
Additional context
NA
The text was updated successfully, but these errors were encountered: