craigkerstiens 6 years ago

When I ran the languages team at Heroku this was something we'd in some ad-hoc basis do for customers when there were major vulnerabilities. To see this fully productized is absolutely awesome! Well done to the GitHub team.

BugsJustFindMe 6 years ago

Appears to be only for Ruby gems and Node.js packages. It's a start, though I was hoping to be able to indicate C++ library dependencies.

The lack of Python requirements.txt support is a bit odd, since it's conceptually quite similar to the two supported mechanisms.

  • Dunedan 6 years ago

    In the meanwhile you can use a combination of pre-commit (http://pre-commit.com/) and safety-db (https://github.com/pyupio/safety-db) in form of https://github.com/Lucas-C/pre-commit-hooks-safety

    That allows you to run a check for vulnerable packages before each commit and via CI.

  • username223 6 years ago

    Another cost of every language wanting at least one of its own dependency managers, often tightly integrated with the build system. The least-bad solution at this point would be to spin up a clean image, install the package in question, and figure out what else was also installed.

  • dflock 6 years ago

    > with Python support coming in 2018.

  • sciurus 6 years ago

    Yeah, but for proper python support you need to handle setup.py too, which being python code is more complex.

    https://python-packaging.readthedocs.io/en/latest/dependenci...

  • pknopf 6 years ago

    How would you effectively do this in a way that is cross-build-platform friendly? CMAKE? autoconf? submodules?

    I don't see that happening.

    • adekok 6 years ago

      Text files?

      If people get value from it, editing a simple text file once or twice a year wouldn't be difficult.

      • scott_karana 6 years ago

        Adding a second source of truth sounds like a bad idea to me. Now you have to update it in lockstep? No thanks.

        • icebraining 6 years ago

          You could make the build tool generate this standard file.

          • scott_karana 6 years ago

            It's still a many to many problem in both cases.

            Option 1: Adding feature to npm/composer/gem/pip ad infinitum

            Option 2: add per-language parser support to the alerting tool instead.

            Option 2 doesn't necessitate a new (information-duplicating, still potentially error prone) standard, and can likely leverage available, tested libraries ;-)

            • matt_kantor 6 years ago

              On the other hand, option #1 requires neither effort nor consent from GitHub to onboard new languages/dependency managers.

        • adekok 6 years ago

          A few things things:

          * any non Javascript / ruby / go languages don't have standard packages, package names, etc.

          * any non Javascript / ruby / go languages may be using one of many build systems. It's just too hard to troll through random build systems to see what dependencies are used

          * therefore, a simple text file is what will work, and is what will be trivial for everyone to use

          * if you find it too hard to update one line in a text file when you add (for example) a new dependency on libldap... you shouldn't be programming

          • _Codemonkeyism 6 years ago

            " any non Javascript / ruby / go"

            Would have thought Maven popularized standard package names and build dependency (POM) files.

            • oblio 6 years ago

              Even more than that, Maven came up with the groupId concept, which I think is under-utilized by many other package managers... The leftpad fiasco could have been mitigated with it, for example.

            • adekok 6 years ago

              How many C / C++ projects use Maven?

      • pknopf 6 years ago

        I see.

        A text file that just declares that "this project uses lib 2.1". It isn't a part of the build system in any way.

        That would be awesome.

  • pavel_lishin 6 years ago

    Support for POM files would be nice, too.

  • rasjani 6 years ago

    Point probably for lacking support for other than npm&gem packages is that for those langs/formats, there is a good sources for getting that sort of data externally.

  • hobarrera 6 years ago

    Actually, Pipfiles are more akin to the two supported mechanisms, requirements.txt is not always used with version pinning

conradk 6 years ago

Clicked through the link to the security apps on the Github Marketplace and had a look at Snyk.io's pricing: 119$ through Github, 99$ if you get it straight from Snyk.io.

And looking deeper into Github Marketplace pricing, I can see that Github takes a 25% cut (https://developer.github.com/apps/adding-integrations/managi...).

What is the benefit of getting anything via the Github marketplace that can be subscribed to outside of the marketplace ? What justifies that 25% cut appart from having a listing of apps ?

  • aupright 6 years ago

    Hey, I'm one of the cofounders of ZenHub - we're another popular integration on the marketplace and also sell our product separately through our own website.

    From a company/integration on the marketplace, the marketplace has been great in terms of building awareness and exposure. Can confidently say that we've been able to reach new users and customers that we wouldn't have otherwise had if we weren't on the marketplace.

    From the perspective of a GitHub user/team, lots of teams prefer to consolidate everything together on a single invoice. If you're using GitHub for software development, you're almost certainly going to need a CI/CD tool and PM tool, so why not bring everything together on a single bill?

    • ssijak 6 years ago

      Single bill is not a reason to pay 25 percent more for everything.

      • samlewis 6 years ago

        If you're a large enterprise, paying an extra $20/month could definitely be worth not having the pain & cost of having your employees having to manage paying an extra bill each month.

      • aupright 6 years ago

        Pricing for the marketplace was completely left up to the discretion of the integrators. There's a number of integrations (ZenHub included) that are the same price whether you buy through the marketplace or through company websites :)

        • daveFNbuck 6 years ago

          So you lose 25% of your revenue on github marketplace sales?

          • webjunkie 6 years ago

            If you see it that way, yes. But getting people to sign up on your website without the 25% cut is also not for free, think about costly advertising and so on. This is probably what Github and other marketplaces bet on. You always pay for any channel, whether it's direct cuts or upfront costs to get a customer.

  • petercooper 6 years ago

    What is the benefit of getting anything via the Github marketplace that can be subscribed to outside of the marketplace?

    Potentially, your company might have a GitHub account you're allowed to add services to, but the finance department is less keen on new accounts. It also provides a well known company to complain to instead of yet another small vendor. Things enterprisey type customers tend to like. Manifold - https://www.manifold.co/ - is another player in this space.

    • rvanmil 6 years ago

      Exactly. Heroku Add-ons are also fantastic in that regard.

  • Khalos 6 years ago

    Perhaps GitHub is taking a cut from the purchase when purchased through their marketplace (20% is reasonably close to other marketplaces). Some services may be building that into the price.

alexlrobertson 6 years ago

Just looked at the "dependencies" for one of my projects and it interprets "react" as this 5 year old, defunct repo: https://github.com/wballard/react.

throwaway2016a 6 years ago

Well this is frustrating. There is an issue with one of my projects apparently (actually saw it before I saw this on HN) and it is because of one of my indirect dependencies.

I presume in this scenario I need to either wait for a patch from the direct dependency or fork and submit a PR myself.

It's a great idea. I like it quite a bit. I just feel like the floodgates just got opened.

Would be great to see PHP and Python in there.

  • jacobra2 6 years ago

    There is now an incentive for that vulnerability to be addressed that didn't exist before. Seems like a security win overall.

benrubydev 6 years ago

It seems like GitHub is slowly moving towards building their own static code analysis and security scanning. CI is probably coming up. This will bury many 3rd party services, but will be more convenient for end users.

  • sdesol 6 years ago

    I've said this in the past, but you really have to focus on the more difficult things, if you want to stay competitive in Git hosting. If it is easy to implement and is useful, one of your competitors, is going to copy you.

    Right now GitHub, GitLab, Bitbucket, Microsoft, Gogs/Gitea, etc. all have something unique to them, but none of them, have the lock in power, like it was in the past with Perforce, ClearCase and other SCMs.

    GitLab and other open source solutions, has turned core Git hosting functionality, into commodity features, that people expect to be good and cheap. So it only makes sense to start focusing on the not so hard things to do, which can't be easily duplicated.

  • busterarm 6 years ago

    GitLab is giving them some competition so they've got to step it up. Nice to see, honestly.

colemickens 6 years ago

(Meta: That GIF should have been two small screenshots. No animation, no looping, no racing to understand before it switches frames. Stop making things GIFs that don't need to be GIFs. It hurts accessibility and adds nothing.)

  • minus7 6 years ago

    Or at least a WebM. But not a fucking 2.8 MiB large GIF.

danjoc 6 years ago

Have had this for years.

mvn org.owasp:dependency-check-maven:check

Java FTW again :)

dmitriid 6 years ago

> Social Network for Children

Lego forums (I don't know if they still exist though). Apparently they went to great lengths to make them safe and accessible for children.

That said though, if anyone can crack this problem, it will be awesome. Children are already social, and are increasingly on the internet. And there are very few, if any, kid-friendly (not kid-condescending, or kids-as-afterthought) resources.

Most of the other problems listed look like first-world problems.

LukeB42 6 years ago

I love whoever's responsible for this.

solatic 6 years ago

> With your dependency graph enabled, we’ll now notify you when we detect a vulnerability in one of your dependencies and suggest known fixes from the GitHub community.

Why not go one step further and automatically open a pull request fixing the issue? If you can build a model of the dependency graph, then changing the version to an up-to-date version should be trivial.

Of course, there's no guarantee that the commit in the pull request will successfully build, and you'd still need a project maintainer to fix issues in the build caused by the version change. But the data you get is invaluable. If the security alert is unfixable (from the project maintainer's perspective, since upstream hasn't released a fix yet), then why are you alerting a maintainer about something unfixable? If the proposed fix's build is green, then the alert should have a "higher volume" (so to speak), and if the proposed fix's build is red, then the "volume" of the alert should be turned down so that the team can focus on fixing the build so that the security patch should be applied.

  • irishsultan 6 years ago

    > If the security alert is unfixable (from the project maintainer's perspective, since upstream hasn't released a fix yet), then why are you alerting a maintainer about something unfixable?

    Sometimes a vulnerability in a dependency doesn't affect you, because you're not using that feature, in other cases the issue does affect you but it's possible to work around it. For the latter case there isn't necessarily a patch that can be generated automatically.

kylecordes 6 years ago

This is both brilliant and frustrating. The brilliant part is much discussed here already, so...

The frustration is that my projects, and I suspect the bulk of projects the get these alerts, get them because of transitive dependency. At least from my first look I did not see the transitive dependency path mentioned, so although I didn't need to know anything to read the alert, I had to dig through NPM features to figure it out.

As the maintainer of "end-user" projects that depend on various big pieces of tooling, it turns out that I'm not really much of a position to do anything about the transitive dependencies anyway, other than manually track down the dependency path and then go open issues in each thing along the way.

Something like the following seems like it would help focus attention toward the points where things have to be fixed: a kind of leaderboard, a (gentle and friendly) "wall of shame". Projects would earn their way to the top of this wall by depending on vulnerable things themselves, and then being depended on by other projects directly or indirectly.

burntrelish1273 6 years ago

This is awesome! I found a security issue in an Elixir/Erlang project that was a dependency of many other projects and it was manual and complicated to coordinate amongst them. IIRC I suggested this to one of the other parties, although it seems trivial and obvious to other people, but it's good that GH also came upon this independently and shipped it.

thesmallestcat 6 years ago

Think carefully about the consequences of this automated scan info leaking before enabling it in your private repositories.

  • fanon 6 years ago

    Are the consequences significantly different than having private repos on Github to begin with?

    I realize this is one more Github service with access to metadata about your code, so the attack surface is technically larger, but is the probability of leak that much greater from this service than it already is by having your code on their servers (which, I assume, are protected by the same security team)?

    Maybe it's an oversimplification but my expectation is that any project with such sensitivity wouldn't be hosted on an external service at all.

SEJeff 6 years ago

How long before this makes github enterprise I wonder.

  • CaliforniaKarl 6 years ago

    I think the answer will be: Once it has been on github.com long enough for people to find any issues that GitHub themselves missed in their internal testing.

dreamdu5t 6 years ago

You don't need to pay anyone for this service. GitHub and Snyk use free public vulnerability lists to check your dependencies.

There are plenty of open source alternatives such as https://github.com/RetireJS/retire.js for JavaScript.

It's absurd that companies are charging $100/mo just to run your dependency list against another public list of vulnerabilities. This service should be offered for free by GitHub.

  • newsgeek12 6 years ago

    This _is_ free from GitHub. At least there's no mention of price in the blog post. I seem to have this feature.

iRobbery 6 years ago

I'd like it if github shows which projects had to be reminded of vulnerabilities this way instead of the developers knowing/addressing things themselves.

gravis 6 years ago

(Hint: Gemnasium founder here) If you like this feature, you may want to try https://gemnasium.com then. We have a lot more advisories in db, for Java, Python, Ruby, PHP and JavaScript. Please feel free if you have any question, I’ll be glad to help!

humblebee 6 years ago

Does it work in a mono repo, or where the Gemfile / package.json are not in the root of the project?

  • holman 6 years ago

    Yup. I have a monorepo with 5-6 Gemfiles/package.jsons in subdirectories and it picks 'em all up.

gbrown_ 6 years ago

This is nice but I really hope people don't become complacent with this and rely on GitHub to notify them of such things.

  • jrochkind1 6 years ago

    I don't know of any way to keep up with vulnerabilities _except_ an automated system. I use `bundle audit` in ruby-land. I don't know why github's automated system will be worse than anyone elses.

    What alternative is there? Hoping you notice something on a listserv and realize its' one of your (possibly indirect) dependencies? That does not seem better. Automated monitoring and alert is the way to go.

    And _everyone_ should _always_ be filing CVE's for their vulnerabilities, to make automated detection so much easier.

    • tkadlec 6 years ago

      Automated tooling is a must, yes. The riskiest part about relying on ONLY GH's solution (IMO) is the NVD/CVE limitation.

      I agree, CVE would be _awesome_ in theory. In reality, very few file for CVE's and so the coverage is iffy (~11% of npm package vulns and about ~67% of rubygem vulns https://snyk.io/stateofossecurity/).

      But it goes beyond that. There was a great paper earlier this year (https://arxiv.org/abs/1705.05347) that highlighted many other issues: lag between CVE and NVD (which is where all the useful info comes from), mismatched CPE's, nonexistent CPE's, etc.

      I would love to see us get to a point where the CVE/NVD was enough, but we're far from it right now.

      • jrochkind1 6 years ago

        github's announcement made clear they don't plan to only rely on CVE/NVD database, but yeah, you've got to pick a tool you think is good.

        I think a great many people at non-large companies are using free tools that I think are unlikely to be better than github's. Or no tool at all.

      • gbrown_ 6 years ago

        > The riskiest part about relying on ONLY GH's solution (IMO) is the NVD/CVE limitation.

        Yup, that is the point I was trying to make.

isarat 6 years ago

iOS projects with Fastlane automatically looks for vulnerabilities with the gems installed.

Sephr 6 years ago

I wonder how this interacts with submodule-style dependencies.

lhinds 6 years ago

No python support :*(

  • hugo19941994 6 years ago

    The post mentions it will be coming in 2018

  • spatulon 6 years ago

    This is something that lgtm.com supports. Right now, I can't find a Python project with a dependency on a vulnerable package to show you, but here's the page that shows Django's dependencies (and this is where a known vulnerable version would be highlighted).

    https://lgtm.com/projects/g/django/django/dependencies

  • ubernostrum 6 years ago

    You can use requires.io or pyup.io right now for Python.

  • gellerb 6 years ago

    One can use sourceclear.com for Python support.

  • urda 6 years ago

    But hey!

      Python support coming in 2018.
partycoder 6 years ago

node.js security is hard to get correctly. Even if you keep your dependencies up to date, your application might be pretty vulnerable unless you know what you are doing.

This is because:

1) frameworks are minimalistic and they give you some large room for error.

2) javascript is very dynamic, and it is time consuming to validate types... unless you are using something like typescript.

3) people tend to use node for orchestration layers/api gateways... and focus their security on the underlying API. But exfiltrating at the orchestration layer is as severe.

tty7 6 years ago

I hope github moves into static analysis!

emceestork 6 years ago

This is great! Looking for to using it.

hartator 6 years ago

Not sure about this. I can see this as an "added stress" if we can't update a dependency for whatever reason and alerts keep popping in.

  • comboy 6 years ago

    With this kind of reasoning you don't need any logging on your servers.

  • jrochkind1 6 years ago

    I do see how knowing that your app has vulnerabilties that you don't plan to fix could be stressful. :)

    Whether github is doing it or not, the baddies will be using similar tools to scan I'm sure.