Closed terriko closed 6 months ago
@terriko I think 2 is where the tool can start to add some real value if some of this can be automated particulaly if this starts to line up with some of the initiatives which are happenning in this area (CSAF, VEX, ...)
I should have a solution soon - just need to handle multiple instances of the same product but different versions
I already have some tools in work which will help with this, in particular merging SBOMs together; not quite ready for release but pretty close. I don't know whether the tols should be integrated into the tool or used by the tool (as libraries). Something to think about...
5 (New) Add some metrics management so it is possible to see trends of vulnerability scans etc.
6 (New) Provide an API wrapper (maybe as a separate project) so that cve-bin-tool facilities can be accessed programmatically
7 (New) The number of parameters is now a lot. I wonder if there should be a way of automatically creating the config files to be used
2 - Re: triage being a potentially a huge contribution. It's a gap I'm seeing in the tooling we use at work. Some of the tools export SBOM data, but very few have a standardized triage method. Figuring that out for us and getting involved in more of the initiatives continues to be a great idea. (@anthonyharrison is already involved, but I haven't been as much)
5 - Metrics is a good idea. A few things I've been asked in the past few months: What's a "normal" number of vulnerabilities for a minimal linux distribution and how many of those are "real" vs those who have backported fixes. How many cves turn out to be incorrect/spurious? (We have some in our own triage file for cve-bin-tool!) How long does it take for "upstream" to fix issues? How long does it take for us to fix something after a fix is available? How much time do we spend with open High risk items (or low, or medium)?
7 - It would be awfully nice to auto-generate an annotated config the way you can with stuff like bandit
and maybe encourage people to use that as their default.
8 (new) Experimenting with scanning large number of github repos and publishing graphs/results highlighting any interesting findings. Maybe quietly helping with automatic pull requests? (This might be more of a gsoc project than a new feature, though)
We've done a lot of these since this discussion! I'm going to go ahead and close this one but we'll probably have a similar discussion sometime soon.
Normally we'd chat about this in a monthly meeting but since I'm intending to cancel the one for December I figured I'd bring the discussion here.
The question is: What's on your cve-bin-tool wishlist? I want to know about features, fixes, or even hare brained ideas. Here's a few of mine to get discussion started:
And not exactly a wishlist item, but we still have the impending change of NVD API 2.0's complete switchover that will likely necessitate a 4.0 release sooner rather than later.