sethmlarson, to random
@sethmlarson@fosstodon.org avatar

Python 3.13.0b1 is now available, and look at all those #SBOM documents for Windows! 🤩

https://www.python.org/downloads/release/python-3130b1/

nluug, to opensource
@nluug@nluug.social avatar

Schrijf je nu in voor de voorjaarsconferentie en leer meer over en uitslagensoftware voor de

Gratis voor leden! Zie https://nluug.nl/evenementen/nluug/voorjaarsconferentie-2024/

ProvenPudding, to random
@ProvenPudding@fosstodon.org avatar

This will be interesting! I know what an is, but sounds like an American police drama series. @fossnorth

davelester, to random
@davelester@fosstodon.org avatar

Good morning from ! Opening keynote: “SBOMs Everywhere: Work in Progress & Challenges Ahead” with some great updates on incl the final release tag of 3.0! https://github.com/spdx/spdx-3-model/releases/tag/3.0

Slide: “Extending SPDX beyond 3.0”

nluug, to opensource Dutch
@nluug@nluug.social avatar

Schrijf je nu in voor de voorjaarsconferentie en leer meer over en uitslagensoftware voor de

Gratis voor leden! Zie https://nluug.nl/evenementen/nluug/voorjaarsconferentie-2024/

sethmlarson, to python
@sethmlarson@fosstodon.org avatar

An update on the release process, , and some thoughts on after talking about it with lots of folks.

https://sethmlarson.dev/security-developer-in-residence-weekly-report-33

heyvaldemar, to devops
@heyvaldemar@mastodon.social avatar

Xeol is a scanner for end-of-life (EOL) software and dependencies in container images, filesystems, and SBOMs (Software Bill of Materials).

https://github.com/xeol-io/xeol

sethmlarson, to python
@sethmlarson@fosstodon.org avatar

Discussed some of the challenges, both social and technical, for creating #SBOM infrastructure for #Python

#opensource #oss #security

https://sethmlarson.dev/security-developer-in-residence-weekly-report-29

cheukting_ho, to random
@cheukting_ho@fosstodon.org avatar

Jeff Mendoza our super star at OpenSSF is teaching us about #GUAC and #SBOM

ThePSF, to python
@ThePSF@fosstodon.org avatar

Software Bill-of-Materials (SBOM) documents are now available for CPython source artifacts! 🥳 https://pyfound.blogspot.com/2024/02/software-bill-of-materials-now-available-for-cpython.html

Ever wonder what CPython is made of? 🤔 SBOMs are like a list of ingredients for software which lets Python users track vulnerabilities in the runtime and its dependencies with confidence instead of guesswork.

https://pyfound.blogspot.com/2024/02/software-bill-of-materials-now-available-for-cpython.html

pvn, to random

Watching the #FOSDEM #SBOM devroom, somewhat disappointed that Bradley Kuhn can come back into this devroom and crusade against SBOMs again and completely ignore that SBOMs have use cases beyond licensing. I understand that people get tunnel vision but even if we did live in the utopia he wants (and I would love to see it as well) there would still be massive value in SBOMs.

nicorikken, to foss
@nicorikken@mastodon.nl avatar

The #FOSDEM fringe event #FOSS #license and #security #compliance tools yesterday was great! The room was filled with energy and knowledge and the willingness to improve things. Many concrete ideas to follow up on. #SBOM all the things!

Tessel from NLNet pitching the funding programs and showing off the projects in a hex-sticker-flag.
Philippe Ombredanne in front of a wall filled with many large post-its with ideas to improve the ecosystem.

sustainoss, to random
@sustainoss@hachyderm.io avatar

Karthik Ram (https://www.linkedin.com/in/karthik-ram-93334954/) & James Howison (https://twitter.com/jameshowison) share 8 vital tips for long-term open-source support, covering software recognition, web analytics, and easy researcher software linking.

Listen at 🎙️ https://podcast.sustainoss.org/218

gvlx,
@gvlx@masto.pt avatar
msw, to infosec
@msw@mstdn.social avatar

Unpopular opinion: "patch all the things" was a zero interest rate phenomenon.

https://www.redhat.com/en/blog/patch-management-needs-a-revolution-part-4

w3cdevs, to security
@w3cdevs@w3c.social avatar

🆕 The report is now live! Dive into key insights shaping the future of web . @openssf, @owasp and @openjsf

▶️ https://www.w3.org/2023/03/secure-the-web-forward/report.html

Acking the challenges face due to the growing complexity of web , participants explored three crucial themes:

  • supply chain security
  • JavaScript security
  • developer awareness

The wsp talks are avail. on https://www.youtube.com/playlist?list=PLNhYw8KaLq2V-EvC1Mcdms3xvkrXjNEpX (w/ subtitles both in and )

w3cdevs,
@w3cdevs@w3c.social avatar

Along with an emphasis on documentation (tutorials, best practices, etc.), the key workshop outcomes are:

  • #SBOM can aid in tracking #security vulnerabilities
  • Source Code Transparency proposal could validate application resources
  • #JavaScript execution could be split in Compartments to isolate third-party code
  • Same origin realms manipulation concerns need to be addressed
  • Deprecation of third-party #cookies presents an opportunity to enhance web cookie model security
Oej, to Cybersecurity Swedish

One thing with the EU Cyber Resilience Act is that manufacturers and Open Source projects are enforced to be more open about the cyber security of their platforms. Manufacturers are supposed to publish all CVEs in their products publicly - not only in their own code, but also in all dependencies (commercial and open source).

For many, publishing a CVE for a security issue is just part of the normal process. Reports come in from research, users or other parties and are processed, verified and published when proved correct. For others, it may feel hurtful, like a personal failure, so CVEs are not filed. In worst case, security issues are fixed without public comments. This way, users may not update their platforms and are exposed to cyber criminals.

We need to make sure that an open vulnerability handling process is a benefit for everyone and that we change the climate to make an open process in an open ecosystem a good thing. What do you think?

#EUCRA #CRA #CyberSecurity #CVE #NVD #VEX #SBOM

c0dec0dec0de, to Software
@c0dec0dec0de@hachyderm.io avatar

SBOM: The origins of our disc contents
#Software #SBOM

sethmlarson, to python
@sethmlarson@fosstodon.org avatar

Want to take a high-quality #Python #SBOM for a spin? Here's a draft for the source code of Python 3.13.0a2:

Meets NTIA Minimum Elements, scores 9.6/10 on SBOM Quality, works with multiple SBOM scanner tools I've tried.

https://gist.github.com/sethmlarson/103891c6cac4d41b11daab89e6c84868

kurtseifried, to random

To put it bluntly: barcodes are a miracle and underappreciated.

Software package identifiers are much harder, which is probably why everyone complains about every existing solution to some degree because they are all. in fact. not great. Because it's a really hard problem. Find out with @kurtseifried and @joshbressers on the #osspodcast https://opensourcesecurity.io/2024/01/07/episode-410-package-identifiers-are-really-hard/

TL;DR: CISA did a REALLY Interesting thought experiment about 4 possible outcomes and you should probably read the paper they produced talking about them.

P.S. I wish I could @cisa

mariuxdeangelo,

@kurtseifried @joshbressers Do you think we need to solve identifiers and locators at the same time? I think this gets mixed up quite often talking about #SBOM. I would be glad if we had a strong identifier that we can use to map vulnerabilities and retrieve additional information. Locators would be great but not that useful considering the complexity. E.g. what it the location is a internal repository I can't access from the internet.

davelester, to random
@davelester@fosstodon.org avatar

New to me: the CPAN Security Working Group, started April 2023. https://security.metacpan.org The draft WG scope incl distributions published by CPAN, and supply chain security.

sjn,
@sjn@chaos.social avatar

@davelester Yes, thank you!

At the #CPAN #Security WG, we care a lot about what happens downstream of CPAN, and with the recent developments around metadata demands (think #SBOM) and cross-ecosystem package references (where PackageURLs are a proposed solution), we're very interested in finding good places to find solutions...

Happy to join the Discord server to see what's going on there!

Do you know of other forums where topics like these are discussed?

tdp_org, to webdev
@tdp_org@mastodon.social avatar

I've only just noticed that GitHub has a "Download SBOM" button on repos, e.g. https://github.com/bbc/simorgh/network/dependencies

It's in SPDX format (https://spdx.github.io/spdx-spec/v2.3/introduction/) which seems pretty reasonable to me from a machine-reading PoV.

Hopefully being a standardised format means it can be ingested into standardised tooling.

jeffluszcz, to random
@jeffluszcz@mastodon.social avatar

On the twelfth day of Christmas my vendor sent to me

Twelve different formats
Eleven package patches
Ten license conflicts
Nine lints a-linting
Eight minified mods
Seven SWIDs a-SWIDing
Six crypto-miners

Five old Springs
Four calling graphs
Three funky pens
Two LOG4Js

And A SBOM for their Source tree

securestep9, to opensource

#SBOM: The NSA, #CISA, ODNI and the CyberSecurity industry partners have released a cybersecurity technical report: “Securing the Software Supply Chain: Recommended Practices for Managing #OpenSource Software and Software Bill of Materials (SBOM):
[PDF]👇

https://media.defense.gov/2023/Dec/11/2003355557/-1/-1/0/ESF_SECURING_THE_SOFTWARE_SUPPLY_CHAIN%20RECOMMENDED%20PRACTICES%20FOR%20MANAGING%20OPEN%20SOURCE%20SOFTWARE%20AND%20SOFTWARE%20BILL%20OF%20MATERIALS.PDF

gbxyz, to php
@gbxyz@noc.social avatar

I just wrote a script to use GraphViz to visualise the dependencies of one of my composer-based #PHP projects, and now I’m wishing I hadn't #sbom #nightmare

sethmlarson, to python
@sethmlarson@fosstodon.org avatar

New article about my proposal for for and hardening the build using compiler options. 🛡️

Articles also now support , so liking and sharing the article will increase the "mentions" count. More to come there!

https://sethmlarson.dev/security-developer-in-residence-weekly-report-19

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • thenastyranch
  • rosin
  • GTA5RPClips
  • osvaldo12
  • love
  • Youngstown
  • slotface
  • khanakhh
  • everett
  • kavyap
  • mdbf
  • DreamBathrooms
  • ngwrru68w68
  • megavids
  • magazineikmin
  • InstantRegret
  • normalnudes
  • tacticalgear
  • cubers
  • ethstaker
  • modclub
  • cisconetworking
  • Durango
  • provamag3
  • tester
  • Leos
  • JUstTest
  • All magazines