Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

As a developer, I want to ensure image dependencies are secure #76

Closed
nutjob4life opened this issue Jul 24, 2024 · 7 comments
Closed

As a developer, I want to ensure image dependencies are secure #76

nutjob4life opened this issue Jul 24, 2024 · 7 comments
Assignees
Labels

Comments

@nutjob4life
Copy link
Member

Checked for duplicates

Yes - I've already checked

πŸ§‘β€πŸ”¬ User Persona(s)

Devops

πŸ’ͺ Motivation

...so that I can ensure the dependencies used in container images are secure and up-to-date.

A scanning tool such as Grype can ensure that package dependencies, operating system versions, and language-specific vulnerabilities do not end up in generated images. Combined with a pre-commit hook, this can prevent such security problems from proliferating into distributed images. GitHub Actions can ensure the safety of such images from contributions made without pre-commit hooks.

The SLIM community has an in-progress guide describing just this.

πŸ“– Additional Details

No response

Acceptance Criteria

Given
When I perform
Then I expect

βš™οΈ Engineering Details

No response

πŸŽ‰ I&T

No response

@riverma
Copy link

riverma commented Jul 24, 2024

Awesome @nutjob4life - interested to hear your experience with this tool and guide. SLIM is currently collecting feedback on how to improve the guide before we publish it to our site.

@nutjob4life nutjob4life self-assigned this Sep 17, 2024
@tloubrieu-jpl
Copy link
Member

Starting with validate.

@tloubrieu-jpl
Copy link
Member

validate has many dependencies, some of them have vulnerabiliies.

@jordanpadams
Copy link
Member

@tloubrieu-jpl @nutjob4life do validate dependencies have vulnerabilities? between dependabot and sonatype, I am surprised we have not caught these. I monitor these closely.

@nutjob4life
Copy link
Member Author

@jordanpadams, yes, validate depended on pds4-jparser, which depended on pds-opencsv, which depended on commons-text:1.9, which had a critical vulnerability (detected using Grype, the container image-scanning tool).

Dependabot caught it roughly the same time I did!

jordanpadams added a commit to NASA-PDS/pds-opencsv that referenced this issue Sep 27, 2024
Mitigates a security vulnerability, fixes package group ID name, and disables an intermittent test assertion failure
jordanpadams added a commit to NASA-PDS/pds4-jparser that referenced this issue Sep 27, 2024
Upgrade opencsv, removing critical security vulnerability
jordanpadams added a commit to NASA-PDS/validate that referenced this issue Sep 27, 2024
Image vulnerability scanning in support of safer devops
@jordanpadams jordanpadams added B15.1 and removed B15.0 labels Sep 30, 2024
@jordanpadams
Copy link
Member

Status: Completed on validate. Will add more sub-tasks for adding this other repos as they come up.

other higher priority repos in the future:

  • Registry API
  • Registry Loader Tools

@jordanpadams
Copy link
Member

Closed per NASA-PDS/validate#1010. Will create new tasks for future expansion to other repos

@github-project-automation github-project-automation bot moved this from ToDo to 🏁 Done in EN Portfolio Backlog Oct 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
Status: 🏁 Done
Development

No branches or pull requests

4 participants