OWASP dep-scan v5 released
dep-scan v5 TUI

OWASP dep-scan v5 released

If there is one product release that can summarize everything my colleagues and I have been working on for a whole year, it is dep-scan v5. Everything we did, from creating the atom project to adding evinse to cdxgen, is to make dep-scan v5 possible.

So, what is depscan v5?

An advanced SCA tool for everyone

dep-scan or depscan or DepScan (name unimportant) is an MIT-licensed Software Composition Analysis (SCA) tool that is purpose-built to forget. Our team got frustrated with the state of all SCA tools and decided to do something about it.

Did you know that an ideal SCA tool must be silent and not distract/prevent the developers from performing their work, which is to build features and fix bugs? It must do everything to triage, prioritize, and make results actionable for users.

CVE Insights

The tool must explain beyond doubt why a given package needs to be updated or why a given usage of a library needs extra mitigation.

Prioritization based on reachability and exploitability

The explanation must be perfect and not based on any pseudo-science or fake exploit prediction scores.

Helpful prompts to improve mitigation

Lastly, the tool must just work for any real-world application for both static and dynamic languages.

Semantic analysis with inter-package flow tracking

Private by design

Depscan performs all analyses, including reachability analysis, entirely in your build environment or CI/CD system. No SBOM or code ever leaves your premises, and there is no telemetry in the code. You can even run depscan in air-gapped environments using the container image or the pypi package. Since the project is MIT-licensed, you can feel free to bundle, integrate, and use depscan anywhere that can support Python > 3.8, Node.js >= 16, and Java >= 17.

Filled with inventions

Implementing an SCA tool that can perform precision reachability analysis entirely in a CI without access to any annotation/symbols data was an impossible task. Our team invented and open-sourced several innovations to make this possible.

  • An automatic symbols tagger (based on SBOM)
  • A light-weight data-flow tracker (interprocedural with both type and purl inference)
  • An efficient static program slicer (constant-time performance)

Automatic tagging

Built on top of OWASP CycloneDX

dep-scan works by making heavy use of the comprehensive BOM generated by CycloneDX Generator (cdxgen). The vulnerability and exploitability results are then saved in CycloneDX VDR format, making it easy to integrate with other tools and platforms such as Dependency Track.

And one more thing

depscan is also an automated VEX machine!

What if we had a machine that could effortlessly prove and justify why a given vulnerability is NOT EXPLOITABLE? Depscan is the only tool that can work both as a VDR tool to report reachable and exploitable vulnerabilities and as a VEX tool to justify non-exploitability. VEX reports can be exported in OASIS CSAF format (Thanks, Omar Santos , for your help and encouragement!)

Thank you

Caroline Russell for single-handedly taking care of all of depscan. This is your product!

Saket Jajoo , for your ORAS and filesystem expertise. Your work is so perfect that none of our users would even notice the database download step.

Tim Messing for numerous improvements to security and ease of use.

Sam Stepanyan for all your insights and the opportunity to present the tool at OWASP London.

And many, many more friends and colleagues for the constant motivation, bug reports, testing, and evangelism!



Ciara Carey

Solutions Engineer at Cloudsmith

1 年

Automated VEX ??

回复
Sriram Kumar

Application Performance | Application Design | Enterprise Architecture | Cloud | Security | Automation

1 年

This is Awesome !!. well done

回复
Omar Santos

Distinguished Engineer, Cybersecurity and AI Security Research - Security & Trust - Cisco Systems

1 年

Outstanding work!!! Congratulations!!!

要查看或添加评论,请登录

Prabhu S.的更多文章

  • Supply Chain Risk Audit is an art

    Supply Chain Risk Audit is an art

    I have the utmost respect for Lead Engineers and Security Leaders, who review the third-party libraries and packages in…

    1 条评论
  • You must be using CVE 5.0

    You must be using CVE 5.0

    A specification must be a joy to use, implement, integrate, and enhance. It must be unopinionated and sufficiently…

    1 条评论
  • Paywalls for SBOMs are fine

    Paywalls for SBOMs are fine

    Everyone hates paywalls. I hate them too; that is why I give away my work for free and open source.

    12 条评论
  • What is open source?

    What is open source?

    There are many definitions of open source. People think it is something you do (contribution), something you use…

    1 条评论
  • DepScan ?? PHP

    DepScan ?? PHP

    Like many worldwide, the recent ownCloud vulnerabilities got us worried as security professionals and tool authors…

  • Towards a hybrid Source and Binary Composition Analysis tool

    Towards a hybrid Source and Binary Composition Analysis tool

    Almost all software, including open-source libraries and IDE plugins, are increasingly distributed as binaries. DevOps…

    3 条评论
  • Is the Linux Foundation distracted?

    Is the Linux Foundation distracted?

    This is my personal opinion and has nothing to do with my affiliations. I have been wanting to write this for a while…

    1 条评论
  • This Thanksgiving, let's thank the preventers.

    This Thanksgiving, let's thank the preventers.

    Ever since LinkedIn changed their recommendation algorithm this month (Is it AI now?), my feeds have become less…

  • Maturing with BOMs

    Maturing with BOMs

    What is the secret to performing an accurate analysis of software and supply chain risks? It starts with collecting a…

  • This Diwali, let's share the knowledge of Application Security.

    This Diwali, let's share the knowledge of Application Security.

    Diwali, the festival of lights, symbolizes the "victory of light over darkness and knowledge over ignorance." If you…

社区洞察

其他会员也浏览了