Open psilva-veeam opened 6 months ago
Thanks for opening this issue :+1:. The team will review it shortly.
If this is a bug report, make sure to include clear instructions how on to reproduce the problem with minimal reproducible examples, where possible. If this is a security report, please review our security policy as outlined in SECURITY.md.
If you haven't already, please take a moment to review our project's Code of Conduct document.
@psilva-veeam we can run this command, but can you please give more info on what should we do with its output? Is it just pass or fail or should we parse and respond to the output values?
Hi, yeah sure. Generally having full RELRO protection, PIE, NX and Stack Canaries would be great. The tool itself always returns with exit code 0 and at least one metric are open ended. One option might be to include the results with exit code 0 and in a later step adding constraints once all fortifications are present as useful
Is your feature request related to a problem? Please describe.
As part of the OpenSSF badge to cover dynamic code checking, testing binaries is an accepted building block to solve this.
checksec
checks for properties of executables (like PIE, RELRO, Canaries, ASLR, Fortify Source) and can provide JSON output for automated processing.https://slimm609.github.io/checksec.sh/
Describe the solution you'd like
Running
checksec
as part of the pipeline during Pull Requests and assert that fortifications are present.(
--format=json
provides json output)Describe alternatives you've considered
Running as a job that is allowed to fail is another option. This seems unlikely to happen once it is working but not impossible e.g. when a new feature is added. One solution may be version pinning though.
Environment
Additional context