aboutcode-org / dejacode

Automate open source license compliance and ensure software supply chain integrity
https://dejacode.readthedocs.io
GNU Affero General Public License v3.0
25 stars 7 forks source link

CRAVEX: Vulnerability exploitability: Identify and store a vulnerability exploitability #98

Open pombredanne opened 5 months ago

pombredanne commented 5 months ago

Create UI and DB models to create and store effective exploitability both org-wide and app- or product-specific.

We should also include tracing data to document the disposition of a vulnerability. (e.g., Tag a package as affected or not either globally, or just for one or more products)

DennisClark commented 3 months ago

see related issue https://github.com/nexB/vulnerablecode/issues/1028

tdruez commented 1 month ago

The next step is to implement the VulnerabilityAnalysisMixin into a concrete Product-context model. The fields available on this mixin are an implementation of the CycloneDX model. Once the concrete model is done, those fields should be added to the Product > "Vulnerabilities" tab as new sortable/filterable columns. Also, an add/edit form should be added in a modal so the Vulnerability analysis fields can directly updated from this tab.

Once this is completed, those fields can be added to the CycloneDX VEX output, at https://github.com/aboutcode-org/dejacode/issues/108

pombredanne commented 1 month ago

from: https://github.com/aboutcode-org/dejacode/issues/108#issuecomment-2332004824

Once the analysis fields from #98 (comment) are available, those can be added in the Vulnerability.as_cyclonedx() method at https://github.com/aboutcode-org/dejacode/blob/main/vulnerabilities/models.py#L206 The content of as_cyclonedx() is directly available in the new VEX output.