Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[security] audit repository tooling #4101

Open
7 of 8 tasks
Tracked by #12
codeboten opened this issue Aug 30, 2023 · 11 comments
Open
7 of 8 tasks
Tracked by #12

[security] audit repository tooling #4101

codeboten opened this issue Aug 30, 2023 · 11 comments
Assignees
Labels

Comments

@codeboten
Copy link

codeboten commented Aug 30, 2023

The security SIG is looking to ensure that security tooling is setup consistently across the organization. As a result, we're asking maintainers to ensure the following tools are enabled in each repository:

  • CodeQL enabled via GitHub Actions
  • Static code analysis tool (the collector uses govulncheck [https://pkg.go.dev/golang.org/x/vuln] on every build)
  • Repository security settings
    • Security Policy ✅
    • Security advisories ✅
    • Private vulnerability reporting ✅
    • Dependabot alerts ✅
    • Code scanning alerts ✅

Parent issue: open-telemetry/sig-security#12

@pichlermarc
Copy link
Member

Hi @codeboten, thanks for opening this issue 🙂

I was going through the items on the list and checked those which we already have enabled; I left out the ones I still have some open questions about (see points below):

  • CodeQL enabled via GitHub Actions
    • this is enabled (see workflow location, runs)
    • Question: Are there any specific recommendations from the Security SIG on running CodeQL? Ours runs once a day, but both the collector and java seem to run on every PR and push to main - should we change our workflow to do the same?
  • Static code analysis tool (the collector uses govulncheck [https://pkg.go.dev/golang.org/x/vuln] on every build)
    • ❌ I think we still need to do that and will look into options.
  • Repository security settings
    • Security Policy
    • Security advisories
      • enabled
    • Private vulnerability reporting
      • enabled
    • Dependabot alerts
      • enabled
    • Code scanning alerts
      • enabled

@codeboten
Copy link
Author

Are there any specific recommendations from the Security SIG on running CodeQL?

I asked the question to the security sig, and created open-telemetry/sig-security#15 to track the recommendation.

Question: is any action necessary in this case? 🤔

I don't think there's any addiitonal steps no.

@sakshi-1505
Copy link

Hi @pichlermarc @codeboten , I would prefer to contribute here. I can add codeql GitHub action & as far as staticcheck tool is considered, how about we use TSLint which is native typescript staticcheck tool?

@dyladan
Copy link
Member

dyladan commented Nov 8, 2023

Hi @pichlermarc @codeboten , I would prefer to contribute here. I can add codeql GitHub action & as far as staticcheck tool is considered, how about we use TSLint which is native typescript staticcheck tool?

CodeQL seems like a good idea and a PR would be welcome. We are already using a linter which solves a different problem.

@pichlermarc
Copy link
Member

We're already running CodeQL via GitHub Action. 🙂
Vulnerability checking is something that we still need to do. We could run npm audit --omit=dev for that though (some devDependencies we have to keep at an outdated version for now as we need to support older node runtimes). 🤔

Copy link

github-actions bot commented Feb 5, 2024

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 14 days.

@github-actions github-actions bot added the stale label Feb 5, 2024
@pichlermarc pichlermarc removed the stale label Feb 5, 2024
Copy link

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 14 days.

Copy link

This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 14 days.

@github-actions github-actions bot added the stale label Sep 30, 2024
@pichlermarc
Copy link
Member

Hi, @codeboten quick question about this point:

Static code analysis tool (the collector uses govulncheck [https://pkg.go.dev/golang.org/x/vuln] on every build)

With Dependabot alerts enabled (which is based on package-lock.json as far as I can tell), and eslint already in place doing some static checking, is there a need for a security-specific static analysis tool to be introduced? 🤔

@pichlermarc pichlermarc removed the stale label Oct 2, 2024
@codeboten
Copy link
Author

@pichlermarc if those tools provide enough coverage for this repo, then I would say it is not needed

@pichlermarc
Copy link
Member

@codeboten thanks for the quick response. I talked with some of the other maintainers yesterday, consensus was that the existing tooling provides us with enough coverage.

Looks like this can be closed as done 🙂

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants