-
-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarify licensing when using pyup.io's security check #5453
Comments
@mattip We had an initiative with pyup.io to upgrade our version of safety and it was around the time that article was published about discontinued free scans. #5218 I will follow up and find out where we are at with this effort to upgrade and continue running against a free version of the database. |
Hello Gents, I'm a bit out of problematic, but have this on my scanner. Could you please advise? Who triggers installation while Many thanks! |
@AndreiPaulau I did not quite understand your question. |
Hi, I mistyped here not |
@AndreiPaulau From what I have been able to tell in the past, it is wired into at least a couple spots in pipenv/requirementslib to do:
Additionally, virtualenv I think is the one that prints out the "added seed packages" message. I found this when I searched about it: https://stackoverflow.com/questions/70460921/how-to-change-seed-packages-versions-when-creating-virtualenv |
New version of pipenv just released today, which has the updated safety command 2.0.3 -- please check it out. |
I am not sure I understand. I asked if there is any kind of agreement that pipenv has entered into with the company behind pyup.io to support the open source projects they scan for vulnerabilities, or any more information about the connection between Also: there seems to be a contradiction in the note: it states "Each month, PyUp.io updates the safety database of insecure Python packages and makes it available to the community for free. But following that link there is a note "Note that this scan and data is for testing purposes only. The data is not up-to-date, and is not licensed for commercial use." So any commercial user of pipenv that runs the safety check could be in violation of the pyup.io terms of service? |
@yeisonvargasf Are you able to seek clarification about the above questions/concerns? |
Hi @mattip, CEO of PyUp here 👋 |
Hi @mattip, thanks again for raising these concerns! Since its inception, PyUp has published a delayed version of our vulnerability database for free for the Python community - Safety DB. The goal was to serve and give back to the open-source community and improve the security of the entire Python ecosystem. I think we've been successful in this: Safety DB is widely used across the ecosystem, and our Safety CLI scanner runs millions of free vulnerability scans every month. This free database was always meant to help open source maintainers keep their codebases and systems secure and so was licensed for non-commercial use. We didn't enforce this, however, and many teams have and still do use the free version of Safety CLI and Safety DB for commercial projects, which technically is against the license terms for that database. We've never taken legal action or any action at all against teams or projects that do this, just hoped and trusted that our paid services were enough of a value to add for some commercial teams to subscribe. We're making a few changes to our databases, licenses and paid features to make all of this clearer and better for the open-source and general Python communities:
PyUp is proud to have served the open source Python community for these 5 years and is committed to continuing to do so! Now Safety CLI (and Additionally, open-source projects (as well as non-profits) can apply for a 100% discount on PyUp's paid plans too. Our goal has never been and never will be to profit off of the open source community. We want to support the open source community as much as we can through free tools and data, as well as making paid features free for open source too. Let me know if that answers your questions, and also happy to jump on a call to discuss this; I'm at [email protected] :) cc @matteius |
Thanks so much for allowing use of Safety DB and for explaining the licensing around it.
Is there more information about this offering? The link you provided to Safety DB still has a disclaimer about commercial use. It seems the version of safety was updated in #5217. It might be nice to print out the terms of use and some attribution (to mention pyup.io) in the output as shown in this comment. |
@mattip great question! Our eng team is ahead of me on publishing our blog post about this new change, but it's coming soon, I'll post it back here when we've released it, probably sometime next week. In the meantime, you can see the license attached to the db that pipenv is now using ( URL: https://d2qjmgddvqvu75.cloudfront.net/aws/safety/pipenv/1.0.0/insecure_full.json - note this URL prompts a download of the jSON) has the license attribution in the meta section of the JSON: Let me know if that answers your questions? And I'll loop back here when our blog post is published! :) |
Indeed the URL listed above has a
I didn't see the blog post. Of course, the project may decide this is too much and close the issue. I was curious how pipenv actually did the security check since some users reported pipenv as the source of a warning when using pypa/wheel, and it took more digging than I expected to find out what was going on. |
Hi! Blog post is not yet published we’re still aligning some other small projects so we can publish at the same time. It will be published in January for sure, thanks for your patience but rest assured that the data used here is Licensed under CC-BY-4.0, as shown by the meta data |
I believe the licensing has been clarified. |
Over at pypa/wheel, I have been following @agronholm's trials and tribulations when trying to fix a regex used internally which may have some side effects. The code is not user facing, but the pyup.io service has determined that this is a security vulnerability and
pipenv check
is marking the older versions of the package as unsafe. The release with this change had to be yanked, and the maintainer is trying to create a valid release with the fix. The problem is that users have opened new issues like pypa/wheel#480, pypa/wheel#481 due to the pyup.io false positive.I see that the
pipenv check
feature has been using pyupio since this commit, so about 5 years. I am curious whether pyup.io has a policy of contributing bounties or PRs to projects that it marks as vulnerable, in an attempt to help overburdened maintainers provide timely solutions. I could not find information on their site, nor any information about the connection between the open source projectpipenv
and pyup.io. Now that pyup has discontinued their free scans, perhaps pypa/pipenv would like to rethink thepipenv check
model or at least publicize how the cooperation with the company helps open source projects.The text was updated successfully, but these errors were encountered: