Accueil
Explorer
Soumettre la recherche
Mettre en ligne
S’identifier
S’inscrire
Publicité
“State of the Tooling” in Open Source Automation
Signaler
Shane Coughlan
Suivre
OpenChain Program Manager à The Linux Foundation
31 Mar 2023
•
0 j'aime
0 j'aime
×
Soyez le premier à aimer ceci
afficher plus
•
33 vues
vues
×
Nombre de vues
0
Sur Slideshare
0
À partir des intégrations
0
Nombre d'intégrations
0
Check these out next
Conversation on Open Source - CU Boulder - Feb 2017
Jason Carolan
On making standards organizations & open source communities work hand in hand
Benjamin Cabé
Managing Open Source Software Supply Chains
nexB Inc.
[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...
WSO2
Leaping the chasm from proprietary to open: A survivor's guide
bcantrill
Scanning Docker Images with ScanCode.io
Michael Herzog
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...
South Tyrol Free Software Conference
FLOSS development
Frederik Questier
1
sur
18
Top clipped slide
“State of the Tooling” in Open Source Automation
31 Mar 2023
•
0 j'aime
0 j'aime
×
Soyez le premier à aimer ceci
afficher plus
•
33 vues
vues
×
Nombre de vues
0
Sur Slideshare
0
À partir des intégrations
0
Nombre d'intégrations
0
Télécharger maintenant
Télécharger pour lire hors ligne
Signaler
Logiciels
“State of the Tooling” in Open Source Automation
Shane Coughlan
Suivre
OpenChain Program Manager à The Linux Foundation
Publicité
Publicité
Publicité
Recommandé
OpenChain Mini-Summit 2023 - State of Tooling in Open Source Automation
Shane Coughlan
165 vues
•
22 diapositives
Introduction to License Compliance and My research (D. German)
dmgerman
180 vues
•
120 diapositives
Open-Source Software Panel - IP Track
Aaron G. Sauers, CLP
76 vues
•
22 diapositives
LCA14: LCA14-110: FLOSS Training
Linaro
3.2K vues
•
17 diapositives
Selecting an Open Source License and Business Model for Your Project to Have ...
All Things Open
54 vues
•
15 diapositives
SFO15-TR1: The Philosophy of Open Source Development
Linaro
702 vues
•
20 diapositives
Contenu connexe
Similaire à “State of the Tooling” in Open Source Automation
(20)
Conversation on Open Source - CU Boulder - Feb 2017
Jason Carolan
•
350 vues
On making standards organizations & open source communities work hand in hand
Benjamin Cabé
•
6K vues
Managing Open Source Software Supply Chains
nexB Inc.
•
1.6K vues
[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...
WSO2
•
782 vues
Leaping the chasm from proprietary to open: A survivor's guide
bcantrill
•
6.5K vues
Scanning Docker Images with ScanCode.io
Michael Herzog
•
67 vues
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...
South Tyrol Free Software Conference
•
76 vues
FLOSS development
Frederik Questier
•
200 vues
Open Source Licenses
Ortus Solutions, Corp
•
4 vues
Choisir le bon business model et la bonne licence pour la survie de son proje...
Open Source Experience
•
36 vues
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
FINOS
•
84 vues
Benefits of Opensource Products
Anju Merin
•
225 vues
Social Code Scanning
Symphony Software Foundation
•
144 vues
Open Source Software Concepts
JITENDRA LENKA
•
1.5K vues
Open soucre(cut shrt)
Shivani Rai
•
426 vues
Opensource wildey
Richard Jobity
•
259 vues
The adoption of FOSS workfows in commercial software development: the case of...
dmgerman
•
658 vues
Open Source Governance at HP
Bruno Cornec
•
2.8K vues
open source technology
Lila Ram Yadav
•
2K vues
Vimeo and Open Source (SMPTE Forum 2015)
Derek Buitenhuis
•
121 vues
Plus de Shane Coughlan
(20)
legal-work-group-2023-05-25
Shane Coughlan
•
10 vues
OpenChain Japan Work Group - Meeting 27
Shane Coughlan
•
69 vues
FOSSLight at the OpenChain Mini-Summit May 2023
Shane Coughlan
•
148 vues
OpenChain Mini-Summit May 2023
Shane Coughlan
•
168 vues
How the Linux Foundation Standards for Compliance and Security will Fix Your ...
Shane Coughlan
•
44 vues
Standardizing Open Source Risk - LLW - 2023-04
Shane Coughlan
•
24 vues
OpenChain Education Work Group - 2023-04-13
Shane Coughlan
•
32 vues
The State of Open Source for Software Alliance Germany 2023-04-14
Shane Coughlan
•
46 vues
OpenChain North America and Europe Meeting - 2023-04-04
Shane Coughlan
•
22 vues
OpenChain Webinar #50 - An Overview of SPDX 3.0
Shane Coughlan
•
221 vues
OpenChain Monthly Meeting - North America / Asia - 2023-03-21
Shane Coughlan
•
66 vues
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)
Shane Coughlan
•
61 vues
OpenChain Monthly Meeting North America - Europe - 2023-02-07
Shane Coughlan
•
96 vues
OpenChain Overview Slides - 02-2023
Shane Coughlan
•
174 vues
OpenChain-Monthly-Meeting-2023-01-17
Shane Coughlan
•
44 vues
OpenChain Monthly Meeting (US / Europe) 2023-01-03
Shane Coughlan
•
74 vues
Open Compliance Summit - Export Control Informal Discussion
Shane Coughlan
•
34 vues
Open Compliance Summit 2022 – State of the Union from Mike Dolan, SVP and GM ...
Shane Coughlan
•
32 vues
Open Compliance Summit 2022 - Opening Keynote
Shane Coughlan
•
95 vues
Open Compliance Summit 2022 - Opening Keynote
Shane Coughlan
•
26 vues
Publicité
Dernier
(20)
The Clean Architecture
Dmytro Turskyi
•
0 vue
最新1:1仿造第戎大学毕业证文凭
gboth
•
4 vues
Top 5 scrapbook layering trends in web designing.pdf
Eligo Creative Services
•
0 vue
Chapter 1-Note.docx
TigistTilahun1
•
3 vues
Csaba_Demo_no_1.pptx
GergKiss7
•
5 vues
Training Materials.pdf
MailJauggernaut
•
2 vues
Keynote + Next Gen UIs.pptx
EqraKhattak
•
4 vues
Mutation testing Bucharest Tech Week
Paco van Beckhoven
•
16 vues
Klaviyo RSVP BUTTON.pdf
31events.com
•
5 vues
SEPM Presentation (2).pptx
YogeshKSahu
•
0 vue
My Work - Feature Release Update.pdf
Orangescrum
•
2 vues
operating system1.pdf
Ganesh198271
•
2 vues
Ch08-CryptoConcepts.ppt
ShounakDas16
•
0 vue
-Test management.pptx
umairshams6
•
3 vues
Chapter 1- Introduction.ppt
TigistTilahun1
•
1 vue
DevSum - Lessons Learned from 2000 microservices
Natan Silnitsky
•
3 vues
Ecommerce Product(s) with Independent Attributes.pptx
Geminate Consultancy Services
•
3 vues
New Website Creation United Kingdom.pdf
HenryWilliam21
•
6 vues
SEMINAR Presentation ppt.pptx
WageYado
•
2 vues
Virtual reality.ppt
AsadKhokhar14
•
0 vue
“State of the Tooling” in Open Source Automation
Copyright © nexB
Inc. License: CC-BY-SA-4.0 “State of the Tooling” in Open Source Automation OpenChain German work group Philippe Ombredanne, AboutCode.org nexB Inc.
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Philippe Ombredanne ► Project lead and maintainer for VulnerableCode, ScanCode and AboutCode ► Creator of Package URL, co-founder of SPDX & ClearlyDefined ► FOSS veteran, long time Google Summer of Code mentor ► Co-founder and CTO of nexB Inc., makers of DejaCode ► Weird facts and claims to fame ● Signed off on the largest deletion of lines of code in the Linux kernel (but these were only comments) ● Unrepentant code hoarder. Had 60,000+ GH forks now down only to 20K forks ► pombredanne@nexb.com irc:pombreda
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Why open source compliance tooling? ▷ Because open source for open source: This is the way! ● Dogfooding ▷ Free as in beer and freedom of course ● Code of course, but do not forget the data! ▷ Key to enable right-sized automation for your open chain ▷ Best-in-class tools in several areas
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Key trends (1) Time to retool? ▷ 3rd wave of Compliance tooling creation and adoption underway ● 1st wave was commercial ● 2nd wave was centered on license compliance and legal ● 3rd wave will be centered on developers and appsec ■ Eventually balanced and holistic FOSS solutions ▷ TODO: Review your existing approach and retool
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Key trends (2) ▷ Security is top of mind ● SBOMs are everywhere, but for what? Few can process them ▷ And license compliance is not yet solved ● Still a lot of work left for automation ● Emerging scripting platforms to capture your pipelines ■ Orchestrate many tools ▷ Open data and data sharing will happen ● Everybody wants it, but also everyone wants to control it ● Centralized or decentralized?
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Key trends (3) ▷ Software health, quality, sustainability are not yet on the radar ▷ FOSS GUI/Web apps are still badly missing ▷ Slowly the analysis of builds and binaries will displace source-only scans ▷ Dependency tracking is not yet solved at scale
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Key trends (4) Best tools are FOSS ▷ The leading tools are mostly FOSS first ● License detection ● Container analysis ● Package detection ● Dependency tracking and resolution ▷ But BEWARE ● Lots of tools are shallow and look only skin deep ■ Barely suitable for serious license or security work ● Do your homework and try the tools: they are open after all
Copyright © nexB
Inc. License: CC-BY-SA-4.0 ▷ Vulnerability and package databases are the new rush ● Open or commercial vulnerability databases with supposedly "premium" content ● But BEWARE of the data quality. Size DOES NOT matter. ■ Made up packages, made up versions ■ Not worth their price: Compare and include open solutions! ▷ Every commercial tool now includes license data ● License data derived from package manifest is NOT ENOUGH ● Built-in policies are impractical: is GPL always bad?? Key trends (5) Poor data quality
Copyright © nexB
Inc. License: CC-BY-SA-4.0 PURL is emerging as the glue to avoid lock-in! ● Started to support package ids in ScanCode and VulnerableCode, now everywhere ○ CycloneDX ○ SPDX including just released GitHub SPDX SBOMs features ○ Google OSV ○ Sonatype OSSIndex ○ New PurlDB, MatchCode ○ Most FOSS tools such as ORT, Fosslight, DependencyTrack, Anchore, Tern and most of the open (and prioprietary) SCA and Infosec/Appsec tools ● Coming to the NVD in version 5.1!! ● Key vector for interop: if two tools speak PURL, integration is made easier ● Demand its adoption by your vendors and projects Key trends (6) PURL is the essential glue
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Key insights (1): Share the data! "I would like to have automation to avoid repeat work when re-running tools" "Let's avoid re-running scans, share them and reuse them instead" ● Everyone wants to share and reuse data from scans, and origin and license data ○ Speed up origin and license review ○ Avoid redoing the scans and the same review either inside my org or across orgs ● But "It is hard to overcome lawyers’ objections to sharing data such as license conclusions and curations" ● And how to trust the scans and curations? And deal with different policies and standards for conclusions and curations? (specifically about licensing) ● What is the motivation and ease for public data sharing?
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Key insights (2): Open the data! ● Open data (e.g., as in free and open licensed data on FOSS) are emerging ○ The too big to share argument will not hold ● Eventually open, community curated FOSS package "knowledge bases" will become the norm and supplant proprietary, closed source alternatives ● We should share raw scanners/tools outputs first ● We should fix upstream licensing issues, upstream ● The centralized approach does not work well ○ Too big to share ○ Out of date ○ Lack of trust in centralized control
Copyright © nexB
Inc. License: CC-BY-SA-4.0 License and Vulnerability are like oil and vinegar ● Even if core process is code origin determination, constituents are not the same (yet) ○ License folks care less about Vulnerabilities ○ Security folks care less about Licenses ● FOSS projects that cater to both should provide differentiated documentation for each audience ● Some core tools are the same, but users are different ● Expect a convergence of the two aspects in the future ● Until then, advice to OSPOs: ○ Handle both domains ○ But adapt your language to each constituent/persona Key insights (3) Licensing != Security?
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Multiple FOSS projects try to solve license compatibility ● FLICT, OSADL, Hermine Oniro ● Automating license conflicts/compatibility checks is a real problem at scale ● Projects may work together and eventually some conventions will emerge ● Key domains ○ Help legal understand/zoom in on key license concerns ○ What is the effect of multiple licenses? ○ How to surface license compatibility issues ● Effective/resulting license inference and compatibility is a policy issue ○ But tooling can automate the grunt work Key insights (4) License Compatibility
Copyright © nexB
Inc. License: CC-BY-SA-4.0 ● Does copying a snippet of code really matter? ○ Have you looked at the big rocks first? e.g., whole libraries ○ Are you ready to pay the price in time and/or cash? Image credits: https://www.integrativenutrition.com/ Key insights (5) Snippets and matching?
Copyright © nexB
Inc. License: CC-BY-SA-4.0 ● Domain has been abandoned by commercial vendors ○ Snyk has spun off FOSSID ○ Synopsys mostly abandoned Protex ● One new entrant with open source code but proprietary data: SCANOSS ● Snippets may not matter (too much) ● But AI/ML-generated code snippets anyone? ○ Will Artificial general intelligence (AGI) make snippets both more relevant and useless at the same time when everyone can generate the same boilerplate derived from everyone's code ● Yet code matching can speed up the analysis when done right (find big rocks first) ○ Reuse previous analysis based on matching code: WIP with MatchCode Key insights (5) Snippets and matching?
Copyright © nexB
Inc. License: CC-BY-SA-4.0 ● SBOMs are everywhere ○ GitHub can even create these directly from a repo ○ But what about data quality (depth and breadth)? ○ But what about using proper machine readable identifiers (license, PURL)? ● Hi-Fi or Lo-Fi SBOMs? ● Every tool creates SBOMs but then what? ○ 2 out of 50+ folks were effectively consuming SBOMs ● Big gaps in tool-to-tool integration ● Too much over engineering, and under-specification ● Advice: Ignore the SPDX vs. CycloneDX feud and embrace both, with PURL ○ Feel free to ignore SWID ○ SBOM is just a reporting format Key insights (6) SBOM, mehBOM?
Copyright © nexB
Inc. License: CC-BY-SA-4.0 ● Collaborate: License conflict/compatibility checking FOSS projects on data and standards (FLIct/OSADl/Hermie) ● Create: A live inventory of all FOSS tools and their capabilities ● Share: Approaches to dependency detection/resolution/processing ● Define: Evolve a standard/schema for tool-to-tool technical scan data sharing ● DATA: Exchange data! Follow up on collaboration opportunities?
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Credits ▷ Presentation template by SlidesCarnival licensed under CC-BY-4.0 ▷ Photograph by Unsplash licensed under Unsplash License ▷ Other content licensed under CC-BY-SA-4.0 18
Publicité