-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
As a developer, I want to ensure image dependencies are secure #76
Comments
Awesome @nutjob4life - interested to hear your experience with this tool and guide. SLIM is currently collecting feedback on how to improve the guide before we publish it to our site. |
Starting with validate. |
validate has many dependencies, some of them have vulnerabiliies. |
@tloubrieu-jpl @nutjob4life do validate dependencies have vulnerabilities? between dependabot and sonatype, I am surprised we have not caught these. I monitor these closely. |
@jordanpadams, yes, validate depended on pds4-jparser, which depended on pds-opencsv, which depended on commons-text:1.9, which had a critical vulnerability (detected using Grype, the container image-scanning tool). Dependabot caught it roughly the same time I did! |
Mitigates a security vulnerability, fixes package group ID name, and disables an intermittent test assertion failure
Upgrade opencsv, removing critical security vulnerability
Image vulnerability scanning in support of safer devops
Status: Completed on validate. Will add more sub-tasks for adding this other repos as they come up. other higher priority repos in the future:
|
Closed per NASA-PDS/validate#1010. Will create new tasks for future expansion to other repos |
Checked for duplicates
Yes - I've already checked
π§βπ¬ User Persona(s)
Devops
πͺ Motivation
...so that I can ensure the dependencies used in container images are secure and up-to-date.
A scanning tool such as Grype can ensure that package dependencies, operating system versions, and language-specific vulnerabilities do not end up in generated images. Combined with a pre-commit hook, this can prevent such security problems from proliferating into distributed images. GitHub Actions can ensure the safety of such images from contributions made without pre-commit hooks.
The SLIM community has an in-progress guide describing just this.
π Additional Details
No response
Acceptance Criteria
Given
When I perform
Then I expect
βοΈ Engineering Details
No response
π I&T
No response
The text was updated successfully, but these errors were encountered: