-
-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Look into the PackageURL
format
#33
Comments
I'd really be interesting in having this project support PackageURL. The project I work on, Dependency-Track, has support for NPM Audit, OSSIndex, VulnDB, with a few others in the works. The entire project is based on the simple concept of using standardized software bill of material documents, and in doing so, we're able to produce some really accurate results. If the bill-of-material format is https://www.nuget.org/packages/CycloneDX, then it supports both direct and transitive dependencies. So an entire solution or project(s) would be imported into Dependency-Track and continuously analyzed. PackageURL is becoming an important standard (already adopted by Dependency-Track and OSSIndex) with supporting being planned by RedHat, SPDX (Linux foundation) and others. If this project were to support PackageURL, I'd be able to easily integrate it into Dependency-Track as a source of vulnerability intelligence. However, in order to do so, the feed would also need to adopt:
If RetireNet were integrated into Dependency-Track (again requires PackageURL and the few things above), the users of the platform would see a RetireNet configuration screen similar to whats here: https://docs.dependencytrack.org/usage/scrm/ along with a RetireNet label next to each of the vulnerability identifiers when viewing results. One question though. I went through all the feeds and noticed all the vulnerable components were System or Microsoft. Does this project focus specifically on core libraries or is there interest in tracking third-party libraries as well? |
Hi, Steve! The It's basically an interim solution until @blowdart solves this part of the From what I gathered, MS were a bit reluctant to du vulnerability flagging on other components than their own, so maybe there will still be a need for maintaining tracking for non-MS components by the community in a central db. But to answer your last question: no, there's no reason to restrict the flagging on MS components at all. It's just what was the most critical and most visible when I created the tool. |
https://www.riskbasedsecurity.com/2018/08/thoughts-on-the-ntia-software-component-transparency-meeting/
https://github.com/package-url/packageurl-dotnet
The text was updated successfully, but these errors were encountered: