Closed dfarrell07 closed 2 years ago
Here’s a test of the Anchore container scan: https://github.com/submariner-io/submariner/pull/797
Uploading the SCARIF results involves participating in the security scanning beta, I’m in the queue for my fork of Submariner.
Additional thoughts: our containers are designed to be as up-to-date as possible based on their base image, except for non-packaged dependencies. The only image which could have undiagnosed, actionable security problems is our base Dapper image; our production images are all based on software which is already tracked by the security teams of the distributions we use.
So ultimately, as long as we regularly rebuild our container images, it’s all about our Go dependencies, and dependencybot is already supposed to track that.
If we ever start supporting multiple streams, with long-term releases, this will become harder to deal with, but until we’re there, we’re in pretty good shape.
This issue has been automatically marked as stale because it has not had activity for 60 days. It will be closed if no further activity occurs. Please make a comment if this issue/pr is still valid. Thank you for your contributions.
This is still relevant.
This issue has been automatically marked as stale because it has not had activity for 60 days. It will be closed if no further activity occurs. Please make a comment if this issue/pr is still valid. Thank you for your contributions.
bump
This issue has been automatically marked as stale because it has not had activity for 60 days. It will be closed if no further activity occurs. Please make a comment if this issue/pr is still valid. Thank you for your contributions.
bump
This issue has been automatically marked as stale because it has not had activity for 60 days. It will be closed if no further activity occurs. Please make a comment if this issue/pr is still valid. Thank you for your contributions.
The CNCF has some partnerships we might be able to leverage here.
@Jaanki mentioned there's a tool Polaris that might be useful here. Something like: https://github.com/devsecops-test/polaris-action
This issue has been automatically marked as stale because it has not had activity for 60 days. It will be closed if no further activity occurs. Please make a comment if this issue/pr is still valid. Thank you for your contributions.
This has been discussed on the issue scrub meeting and decided to close for now. If this will become a priority it can be reopened
Looking at this more, it seems like this would have caught the current Lighthouse text lib CVE before downstream scanning caught it, which would be much lower cost to fix than waiting for it to be in a release downstream.
Also discussed on the scrub, re-opening and will handle as a part of that fix.
This looks interesting, but not ready for use yet:
This also looks interesting, but we'd need a Snyk account.
https://marketplace.visualstudio.com/items?itemName=redhat.fabric8-analytics
It would be interesting to check if CodeQL identifies anything not found by other tools.
https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning-with-codeql https://codeql.github.com/
And the rest of them:
It would be interesting to check if CodeQL identifies anything not found by other tools.
https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning-with-codeql https://codeql.github.com/
Evaluating CodeQL vuln variant analysis here: https://github.com/dfarrell07/lighthouse/pull/6
The Go security rules are here (I don't see better docs): https://github.com/github/codeql/tree/main/go/ql/src/Security
I used LGTM.com to run CodeQL against all the submariner-io repos. The test I did in Lighthouse was just unlucky to not see any new issues, there are other (minor from what I see so far) issues in other repos.
This is done. :heavy_check_mark:
What would you like to be added:
Scanning for known vulnerabilities in the container images we publish, and a feedback loop from that scanning to highlight the problem and encourage a fix. Some scanning already happens on Quay, but we don't do anything with that information.
For example: https://github.com/marketplace/actions/anchore-container-scan.
As a different type of scanning, we may also want to look into: https://github.com/octarinesec/kube-scan
Why is this needed:
More security more better.