Open Source Software (OSS)
is amazing, and risky.
Let’s secure what you are using!
Nicole Schwartz
I speak about DevSecOps, Agile, Diversity & Inclusion, and Women in Technology.
I am currently a Senior Product Manager of Security at ActiveState, Staff for The Diana Initiative, Skytalks, and BSides Edmonton.
What is OSS?
“Open source software is software with source code that anyone can inspect, modify, and enhance.”
Open Source Software (OSS)
“
”
Why Use OSS?
OSS has enabled the acceleration of software development
Who Uses OSS?
Most companies!
“Seventy-seven percent of all code in the codebases originated from open source. Every industry codebase scanned contained open source—most at percentages from 99% to 100%.”
“
”
What risks come with OSS?
License Obligations
We can build really complex things because we have an entire lego kit to work with.
Risk: Licenses copy-left
XKCD 927
Defects / Vulnerabilities (CVE)
Accidental (heartbleed)
Intentional
(XZ Utils)
Introduces more software supply chain threats
Your source code uses OSS
OSS uses OSS
That OSS uses OSS
Open Source Vulnerabilities and the Software Supply Chain
Source
Build
Artifacts
Cloud
Commit Malicious Code
Hardcoded Secrets
Bad IaC Templates
Code Leaks
Modify Code
Compromise Build Systems
Bypass CI/CD
Compromise Package Repository
Use Bad Package
Insecure Configurations
Dependencies
Infrastructure Drift
Use Bad Dependencies
Commit Malicious Code
Vulnerabilities vs Supply Chain Threats
Vulnerabilities
Community Abandonment of Project
Free like puppies
XKCD 2347
What OSS are you using?
Knowing what you have and where it is is critical for being able to monitor and respond to issues.
Ways to get an inventory
Third-Party (Commercial)
I Know What I Have…
18
How do you mitigate the risks?
Secure by design
Urging prioritization “prioritize the features, mechanisms, and implementation of tools that protect customers rather than [prioritizing] product features.”
Security Scanners
Security Scanners
SAST - SemGrep
Secret Detection - TruffleHog
Container Scanning - Trivy
License Compliance - FOSSology
DAST - ZAP
Malware Scanning - OpenSSF package-analysis
Fuzzing - fuzzy lop
SCA
Speaking of SCA
SCA works with or can work from - SBOM
Openssf protobom (CycloneDX, SPDX)
DaggerBoard
Vulnerability Exploitability Exchange (VEX)
OpenSSF Scorecard
OpenSSF Scorecard assesses open source projects for security risks through a series of automated checks. It was created by OSS developers to help improve the health of critical projects that the community depends on.
Frameworks
Restrict / Monitor Repositories
DIY
JFrog
GitLab
ActiveState
Vuln triage & remediation process
Vulnerability Triage
Tune the noise
Focused based on Threat Models
Vulnerability Remediation
Mean Time to Remediation (MTTR)
Keep (somewhat) up to date
Patches are less painful when it’s muscle memory
Other Tools
But I *really* want to be safe…
How can I help (everyone)?
Demo
Scenario: you get an email about two pressing issues
CVE-2022-40898 https://nvd.nist.gov/vuln/detail/CVE-2022-40898
An issue discovered in Python Packaging Authority (PyPA) Wheel 0.37.1 and earlier allows remote attackers to cause a denial of service via attacker controlled input to wheel cli.
41
ActiveState Platform �- Find OSS
42
Risks in the OSS
43
Package/CVE Search
Recap
Adam said
TJ said
Q&A
50
Thank you
Try the ActiveState Platform for free: