-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Integrate Malicious Package Analysis with vet
#303
Comments
FeedbackMarkdown Summary ReportWe will provide the following feedback to the user as part of
Note: Summary ReportWe will extend summary report to provide a status on number of packages with known & unknown malware scan results. The unknown may happen because we will set a time limit (configurable) for malware scans to finish beyond which we will not wait to avoid slowing down SDLC process. Subsequent scans will likely have the reports available and will improve coverage. ImplementationWe will improve our data enrichment system to enrich discovered packages with malware scan report. The enrichment layer is however not responsible for making a decision on LimitationsMalicious Package scanning is a time intensive process. Not all packages can be scanned within reasonable time. Hence we will set a configurable default time limit to wait before wrapping up malicious package detection and provide reporting that highlights
|
Ref: #309 |
vet Summary ReportThis report is generated by vet Policy Checks
ThreatsLockfilePoisoning
Malicious Package AnalysisMalicious package analysis is performed using SafeDep Cloud API. Malicious Package Analysis Report
Changed PackagesChanged Packages
|
Background
We have a basic client integration of
safedep.io
Malware Analysis service integrated withvet
. This is documented in: https://docs.safedep.io/cloud/malware-analysisHowever, given the nature of the service and the rate limits, we cannot scan every single package in a dependency graph every time like what
vet
does with OSS packages. We need the ability to only perform analysis on packages that are considered to be untrustworthy or risky byvet
. The output of Malicious Package analysis service can be leveraged byvet
to reduce or eliminate the need to manually analyse any potentially unpopular package. It will also allow users to usevet
to establish a proactive guardrail against malicious OSS packages that perform active scanning and not just a database query.The text was updated successfully, but these errors were encountered: