-
Notifications
You must be signed in to change notification settings - Fork 464
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GSoC 2023 brainstorming thread #2354
Comments
@terriko There is a lot happenning in the VEX world. VEX is a concept and not a standard so we should support the CSAF format which is being sited as being an example of a VEX as well as the VEX format (which is based on CycloneDX) which cve-bin-tool currently supports. We should possibly look at providing some SBOM/VEX tooling around cve-bin-tool to provide an overall vulnerability managament solution :
Think this is a perfect candidate for wrapping up in a HCI (using Flask, FastAPI or Django?) Another idea would be to create an API for cve-bin-tool instead of just the command line. Think this might enable the tool to be used in some of the vulnerability portals which are starting to appear. Scanning the internet might take some time. :-) Think it would be good if we could offer hooks for package installers to do a scan (and generate sbom, vex, ...). Having cve-bin-tool as part of Python packaging would be a great addition (would this help prevent malware being installed on pypi?) |
Okay, I've got the EPSS and meta-data ideas linked on the main gsoc issue, which is good enough for me to add us as a Python sub-org and start getting things rolling there. I feel like the other big things I want to look at for next release:
SBOM export I'm guessing we will have at least basically working soon, and @anthonyharrison is already working on some other tools. Is there anything missing in that space or that we need for cve-bin-tool operation that we could turn into a gsoc-sized project? Triage workflows: We've got more than one gsoc project's worth of ideas here and I'm struggling to prioritize but I'll see if I can work up something today. I put up a start of a caching idea but there's some open questions there that might make it not the most self-contained for gsoc, and someone is already interested in it outside of the scope of the gsoc program. Anything else I should be considering turning into an actual project idea? |
@terriko The triage work I think could be split into two (or be a 350 hour project). One is the generation of the various VEX documents (CyclonedDX - done, CSAF - in progress, OpenVEX - to be done) and I would also like to add Vulnerability Disclosure Reports (see NIST SP 800-161). The other aspect I see would be creating tools around the triage lifecycle managing the various artefacts, updating them rather than editing JSON documents, etc. This could initially be a simple UI but as with most of these simple ideas it will probably grow into something far more complex :-) I think the SBOM work surrounds generation of a document (stretch target would be to update an existing one) from a scan (I have an almost working prototype now! which will also help with the production of a VDR). I have tools to compare SBOMS (sbomdiff ) and document an SBOM (in Markdown, PDF and to a console) (sbom2doc so the only thing I can see would be to enhance/develop github actions to scan a repo, create a SBOM, document it and compare against the previous version. Useful but possibly not big enough for a GSOC project on its own, but if we add an audit function to cve-bin-tool to compare repeated vulnerability scans of the same SBOM, binaries etc and then notify a user if there is a change (e.g. a new vulnerability) then that might be useful and be a bigger project. However, I would like to see if there is some audit activity which could |
@anthonyharrison I dumped a bunch of triage thoughts into #2639. Updates and more precise ideas welcome. :) |
Closing this since GSoC applications are in and we no longer need this brainstorming thread. |
This thread is intended for folk to brainstorm about potential project ideas for GSoC 2023. The idea is to have a separate thread from the "GSoC start here" issue (#2230) so that we have a place where we can talk about ideas that may be completely not viable. Once we get some ideas that are viable and well-described enough that a GSoC contributor could take it and run with it, we'll add them to #2230.
Some thoughts off the top of my head:
Anyhow, even "bad" ideas are worth discussing at brainstorming stage, so don't be shy even if something might not wind up viable for gsoc. Brainstorm away!
The text was updated successfully, but these errors were encountered: