-
Notifications
You must be signed in to change notification settings - Fork 464
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GSoC 2023: Start Here #2230
Comments
I was going through open source repos to find a repo where I could contribute. This is the most extensively documented repo that I have come across as of now. Repos which are clearly documented help by reducing the "being overwhelmed" feeling that every newbie has. Kudos to you @terriko your replies on issues shows how welcoming and warm the open source community is. Keep up the good work! Will surely try to contribute towards the repo and send some newbies here! :)) |
It's look nice project to start I am starting my path a open source developer . |
Hey @terriko the link to new contributor guide in the guide above is not working. |
You can view the contributor guide by clicking here |
Thanks @rootxrishabh and @metabiswadeep -- I'd forgotten that we changed to match the expectations of github so the doc link would have changed since last year! It's fixed in the main post now. |
GSOC 2023 Project Idea: Add support for looking up on Snyk since a plethora of dependency introduced vulnerabilities are tracked in Snyk with appropriate CVE rating and additional parameters. |
@m4ckk Does Snyk have a license for their data that would allow this usage? I'd be sort of surprised if this was allowed since their improved data is part of the value they bring to encourage people to pay them and buy enterprise license. |
Some notes for folk who weren't in yesterday's meeting:
GSoC mentors: if you're up for doing proposal review this week and next, please post here so people know your usernames and can ping you. |
For anyone wanting to get a review regarding their GSoC proposals, feel free to ping me up, I go by the same name on Gitter as well. |
Same goes for me, If anyone wants a review, you can contact me on Gitter. |
Closing this one and I'll open a new issue for GSoC 2024. |
CVE Binary Tool is hoping to participate in GSoC 2023 under the Python Software Foundation umbrella. We won't know if we've been accepted until Feburary 2023. You can view the GSoC 2023 dates and deadlines on Google's page This issue will be updated with more info as we know it.
About CVE Binary Tool
The CVE Binary Tool is a free, open source tool to help you find known vulnerabilities in software, using data from the National Vulnerability Database (NVD) list of Common Vulnerabilities and Exposures (CVEs).
The tool has two main modes of operation:
It is intended to be used as part of your continuous integration system to enable regular vulnerability scanning and give you early warning of known issues in your supply chain. We expect the SBOM use case to become a lot more popular as people who work with the US government start needing to provide SBOMs as a matter of course, starting in 2023.
Dates:
Project ideas:
Related:
Not all ideas will be viable because of the constraints of the program and the software, but all ideas are welcome for discussion even if we can't make them into gsoc projects.
Getting started:
(cut and pasted below)
It can be really overwhelming figuring out how to start in a new project, so here's some steps we recommend:
Getting Started:
/bin
directory usually yields some interesting results.Some potential first contributions:
We expect prospective GSoC students to have made at least one code contribution if they want their application to be considered, so now's a good time to get that going! You can ask for as much help as you need.
Got stuck?
The text was updated successfully, but these errors were encountered: