-
Notifications
You must be signed in to change notification settings - Fork 464
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GSoC 2023 Idea: add github actions with "fancy" reporting #2756
Comments
I've added the gsoc label because I think maybe we could put together enough to make a viable gsoc project out of this, but I won't put it on the actual list until it's a bit more well described above. |
For those who maybe haven't used dependabot, here's what it looks like on our repository. Now cve-bin-tool is an "interesting" repo to scan, because our test/ directory is filled with files that look like vulnerable code. Dependabot can't handle binaries but it can scan the language lists we use for testing the language parser, so you can see that I've gone around and marked a lot of those as "vulnerable code is not actually used." Currently I have to do this for every single time it finds something, there's no way to skip directories or files that I know will have regular issues. With the pull requests (you can see them linked on the right in the screenshot) it looks like they've maybe added the ability for me to skip specific dependencies for major/minor versions so that might mean eventually I'll be able to ignore all the test data by telling dependabot about each one as it comes up. So I guess I'll add "make it possible to skip directories / skip files / skip specific dependencies" to the feature wishlist for this one. |
okay, edited the top post to get this well-described enough to put on the gsoc list, so I'm going to go ahead and add it there. |
This was completed in summer 2023 and can now be closed. |
cve-bin-tool: Add GitHub action including "fancy" reporting and triage integration
Project description
It would be neat if we could run scans as a github action and have cve-bin-tool generate reports into the security tab with results, similar to what we see with dependabot and ossf scorecard. I've added the gsoc label because I think maybe we could put together enough to make a viable gsoc project out of this.
Here's a brain dump of some possible ways this could work:
CVE Binary Tool works in a similar space to dependabot, but potentially has some advantages that would make it nice for people to use:
So it would be pretty neat to have it as an option that could be enabled in the same way.
Related reading
Skills
Difficulty level
Project Length
GSoC Participants Only
This issue is a potential project idea for GSoC 2023, and is reserved for completion by a selected GSoC contributor. Please do not work on it outside of that program. If you'd like to apply to do it through GSoC, please start by reading #2230 .
The text was updated successfully, but these errors were encountered: