-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for automatically disclosing security issues #85
Comments
Just thought about this again. This is what we have in the SilverStripe.org CMS at the moment: We could probably replace this with two textareas and use a structure like one line per module, and the format of We could potentially also add an API endpoint to expose the structured data for all security announcements on the website as structured JSON, and then this command could essentially run a sync command to pull the security advisory repository, rebuild all security alerts and make a commit if anything new is added. @chillu do you have any thoughts on this? I'll probably pick it up on hackday. |
FYI there's a PoC branch here: https://github.com/creative-commoners/cow/tree/pulls/master/add-advisory-sync |
Also, a team is overhauling SS.org right now - I'm trying to get some more defined form fields for adding security advisories in the CMS. |
😄 A multi-input list of composer package names and semver constraint fields would be ideal, e.g.:
Just an idea... |
I think we should base this on Github's new security advisories, rather than FriendsOfPHP. Which submits CVEs as well. Between those two, we cover more ground than through FriendsOfPHP + CVE? See silverstripe/silverstripe-framework#9335 |
It'd be nice if GitHub exposes the ability to do this via their API at some point! |
Here's an example of the confusion caused by not being clear about the module that a release relates to :)
You could also argue that if a vuln is present in more than one module, it should be flagged as multiple vulns. That makes it less ambiguous if you're still running vulnerable code as well. https://github.com/FriendsOfPHP/security-advisories/ doesn't seem to allow referencing multiple packages in a single issue, so we shouldn't either. I'd argue that there's two levels of information:
Proposed ACs:
|
The SensioLabs security checker (and the PHP package for it) uses https://github.com/FriendsOfPHP/security-advisories as a data source, which contains some of our older vulnerabilities that were manually added.
It would be nice for cow to automate this process to some extent, so we can incorporate pushing out security notifications to repositories like this one. This would add weight to some of the features of CWP coming up like the "site summariser" module which includes listing known security vulnerabilities in the report: https://github.com/bringyourownideas/silverstripe-composer-security-checker and https://github.com/bringyourownideas/silverstripe-maintenance/
Some implementation ideas:
Other considerations:
Contributing guide: https://github.com/FriendsOfPHP/security-advisories#contributing
First priority would be to ensure that this repository is up to date with the current list of disclosed vulnerabilities (cc @stevie-mayhew)
The text was updated successfully, but these errors were encountered: