-
Notifications
You must be signed in to change notification settings - Fork 187
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Withdrawing OSV reports is too heavyweight #2177
Comments
Hey @davidben Could you describe what your current user journey looks like, and what an appropriately lightweight one could look like? |
What happened here was:
As for what would be better, basically every step in this process went wrong.
|
Timestamps alone make this process quite off-putting: #857 (comment). I'm still not sure how to get them right :-) |
Brilliant, thanks for all this detail, it's very helpful.
So based on google/oss-fuzz-vulns#37 being how to correct things, I think it's fair to say that this should read "When OSS-Fuzz gets it wrong"? Based on your fourth point above, a wee bit of tooling to aid with manipulating that YAML sounds like it would go a long way to addressing the "lightweight" part of things, plus a modicum of documentation? I would imagine some sort of GitHub Action could allow PRs from users identifiable as affiliated with the project the PR is the subject of to be automatically merged, thus removing the human component... So, at a high level, perhaps:
I'm still on the fence about whether this issue belongs in the OSV.dev repo or the OSS-Fuzz repo... |
I wouldn't say OSS-Fuzz gets it wrong. It works as expected in the sense that it reports issues fuzz targets hit (regardless of whether they have anything to do with security or not). I think the wrong part here is that everything gets automatically imported into the OSV database with no vetting.
That would have certainly helped in google/oss-fuzz#7434.
It should help but I'm not sure it can be (fully) automated. For example in google/oss-fuzz#11883 the OSS-Fuzz bot (which tries to do that) didn't recognize the maintainers. Other than that some maintainers aren't on GitHub so they can't open PRs. Some maintainers don't have access to Monorail because they don't have gmail accounts and bug reports just get sent to their mailing lists. I have to admit I don't know how to fix that. It seems to me that one option would be turn off this import by default and let projects opt-in. If they decide to do that it should probably be safe to assume that they read the documentation, know what OSV is and are ready to vet bug reports. Another option would be to separate the OSS-Fuzz feed from OSV where it wouldn't be automatically implied that they are vulnerabilities. |
Given that OSV reports from OSS-Fuzz are currently false-positive-laden (see #2176 and google/oss-fuzz#11925), the withdrawal process needs to be much smoother. Manually making a PR and trying to keep to some YAML spec (I'm still not sure if I got the timestamps right) is too heavyweight.
The text was updated successfully, but these errors were encountered: