Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add Anchore go dependency security scanning, investigate others #794

Closed
dfarrell07 opened this issue Sep 10, 2020 · 25 comments
Closed

Add Anchore go dependency security scanning, investigate others #794

dfarrell07 opened this issue Sep 10, 2020 · 25 comments
Assignees
Labels
automation cncf priority:medium size:medium This can be implemented in a single sprint

Comments

@dfarrell07
Copy link
Member

dfarrell07 commented Sep 10, 2020

What would you like to be added:

Scanning for known vulnerabilities in the container images we publish, and a feedback loop from that scanning to highlight the problem and encourage a fix. Some scanning already happens on Quay, but we don't do anything with that information.

For example: https://github.com/marketplace/actions/anchore-container-scan.

As a different type of scanning, we may also want to look into: https://github.com/octarinesec/kube-scan

Why is this needed:

More security more better.

@dfarrell07 dfarrell07 added this to the 0.7.0 milestone Sep 10, 2020
@dfarrell07 dfarrell07 self-assigned this Sep 10, 2020
@skitt
Copy link
Member

skitt commented Sep 10, 2020

Here’s a test of the Anchore container scan: #797

Uploading the SCARIF results involves participating in the security scanning beta, I’m in the queue for my fork of Submariner.

@skitt
Copy link
Member

skitt commented Sep 10, 2020

Additional thoughts: our containers are designed to be as up-to-date as possible based on their base image, except for non-packaged dependencies. The only image which could have undiagnosed, actionable security problems is our base Dapper image; our production images are all based on software which is already tracked by the security teams of the distributions we use.

So ultimately, as long as we regularly rebuild our container images, it’s all about our Go dependencies, and dependencybot is already supposed to track that.

If we ever start supporting multiple streams, with long-term releases, this will become harder to deal with, but until we’re there, we’re in pretty good shape.

@dfarrell07 dfarrell07 modified the milestones: 0.7.0, 0.8.0 Oct 7, 2020
@stale
Copy link

stale bot commented Dec 18, 2020

This issue has been automatically marked as stale because it has not had activity for 60 days. It will be closed if no further activity occurs. Please make a comment if this issue/pr is still valid. Thank you for your contributions.

@stale stale bot added the wontfix This will not be worked on label Dec 18, 2020
@skitt
Copy link
Member

skitt commented Dec 18, 2020

This is still relevant.

@stale stale bot removed the wontfix This will not be worked on label Dec 18, 2020
@dfarrell07 dfarrell07 removed this from the 0.8.0 milestone Jan 28, 2021
@dfarrell07 dfarrell07 removed their assignment Jan 28, 2021
@stale
Copy link

stale bot commented Mar 29, 2021

This issue has been automatically marked as stale because it has not had activity for 60 days. It will be closed if no further activity occurs. Please make a comment if this issue/pr is still valid. Thank you for your contributions.

@stale stale bot added the wontfix This will not be worked on label Mar 29, 2021
@tpantelis
Copy link
Contributor

bump

@stale stale bot removed the wontfix This will not be worked on label Mar 29, 2021
@mkolesnik mkolesnik added the size:medium This can be implemented in a single sprint label May 4, 2021
skitt pushed a commit that referenced this issue Aug 17, 2022
Add scanning of Go dependencies for known vulnerabilities.

Ignore two false positives.

Relates-to: #794
Signed-off-by: Daniel Farrell <[email protected]>
@dfarrell07
Copy link
Member Author

@dfarrell07
Copy link
Member Author

dfarrell07 added a commit to dfarrell07/subctl that referenced this issue Aug 17, 2022
Scan Go dependencies for known vulnerabilities.

Run on PRs to gate on vulns negligible or higher.
Also run on merges to devel and release branches to report results on
the GitHub Code Scanning tab.

Ignore two false positives.

Relates-to: submariner-io/submariner#794
Signed-off-by: Daniel Farrell <[email protected]>
dfarrell07 added a commit to dfarrell07/admiral that referenced this issue Aug 17, 2022
Scan Go dependencies for known vulnerabilities.

Run on PRs to gate on vulns negligible or higher.
Also run on merges to devel and release branches to report results on
the GitHub Code Scanning tab.

Ignore two false positives.

Relates-to: submariner-io/submariner#794
Signed-off-by: Daniel Farrell <[email protected]>
dfarrell07 added a commit to dfarrell07/cloud-prepare that referenced this issue Aug 17, 2022
Scan Go dependencies for known vulnerabilities.

Run on PRs to gate on vulns negligible or higher.
Also run on merges to devel and release branches to report results on
the GitHub Code Scanning tab.

Ignore two false positives.

Relates-to: submariner-io/submariner#794
Signed-off-by: Daniel Farrell <[email protected]>
dfarrell07 added a commit to dfarrell07/coastguard that referenced this issue Aug 17, 2022
Scan Go dependencies for known vulnerabilities.

Run on PRs to gate on vulns negligible or higher.
Also run on merges to devel and release branches to report results on
the GitHub Code Scanning tab.

Relates-to: submariner-io/submariner#794
Signed-off-by: Daniel Farrell <[email protected]>
dfarrell07 added a commit to dfarrell07/shipyard that referenced this issue Aug 17, 2022
Scan Go dependencies for known vulnerabilities.

Run on PRs to gate on vulns negligible or higher.
Also run on merges to devel and release branches to report results on
the GitHub Code Scanning tab.

Ignore two false positives.

Relates-to: submariner-io/submariner#794
Signed-off-by: Daniel Farrell <[email protected]>
@dfarrell07
Copy link
Member Author

It would be interesting to check if CodeQL identifies anything not found by other tools.

https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/about-code-scanning-with-codeql https://codeql.github.com/

Evaluating CodeQL vuln variant analysis here:
dfarrell07/lighthouse#6

The Go security rules are here (I don't see better docs):
https://github.com/github/codeql/tree/main/go/ql/src/Security

@dfarrell07
Copy link
Member Author

I used LGTM.com to run CodeQL against all the submariner-io repos. The test I did in Lighthouse was just unlucky to not see any new issues, there are other (minor from what I see so far) issues in other repos.

lgmt_codeql_scan_submio

@dfarrell07
Copy link
Member Author

dfarrell07 commented Aug 18, 2022

lgmt_codeql_scan_subadd
lgmt_codeql_scan_subop
lgmt_codeql_scan_subctl
lgmt_codeql_scan_subm

skitt pushed a commit to submariner-io/cloud-prepare that referenced this issue Aug 18, 2022
Scan Go dependencies for known vulnerabilities.

Run on PRs to gate on vulns negligible or higher.
Also run on merges to devel and release branches to report results on
the GitHub Code Scanning tab.

Ignore two false positives.

Relates-to: submariner-io/submariner#794
Signed-off-by: Daniel Farrell <[email protected]>
skitt pushed a commit to submariner-io/coastguard that referenced this issue Aug 18, 2022
Scan Go dependencies for known vulnerabilities.

Run on PRs to gate on vulns negligible or higher.
Also run on merges to devel and release branches to report results on
the GitHub Code Scanning tab.

Relates-to: submariner-io/submariner#794
Signed-off-by: Daniel Farrell <[email protected]>
skitt pushed a commit to submariner-io/subctl that referenced this issue Aug 18, 2022
Scan Go dependencies for known vulnerabilities.

Run on PRs to gate on vulns negligible or higher.
Also run on merges to devel and release branches to report results on
the GitHub Code Scanning tab.

Ignore two false positives.

Relates-to: submariner-io/submariner#794
Signed-off-by: Daniel Farrell <[email protected]>
tpantelis pushed a commit to submariner-io/admiral that referenced this issue Aug 18, 2022
Scan Go dependencies for known vulnerabilities.

Run on PRs to gate on vulns negligible or higher.
Also run on merges to devel and release branches to report results on
the GitHub Code Scanning tab.

Ignore two false positives.

Relates-to: submariner-io/submariner#794
Signed-off-by: Daniel Farrell <[email protected]>
tpantelis pushed a commit to submariner-io/shipyard that referenced this issue Aug 18, 2022
Scan Go dependencies for known vulnerabilities.

Run on PRs to gate on vulns negligible or higher.
Also run on merges to devel and release branches to report results on
the GitHub Code Scanning tab.

Ignore two false positives.

Relates-to: submariner-io/submariner#794
Signed-off-by: Daniel Farrell <[email protected]>
@dfarrell07 dfarrell07 changed the title Add Anchore go dependency security scanning Add Anchore go dependency security scanning, investigate others Aug 18, 2022
@dfarrell07
Copy link
Member Author

This is done. ✔️

skitt pushed a commit to skitt/shipyard that referenced this issue Feb 22, 2023
Scan Go dependencies for known vulnerabilities.

Run on PRs to gate on vulns negligible or higher.
Also run on merges to devel and release branches to report results on
the GitHub Code Scanning tab.

Ignore two false positives.

Relates-to: submariner-io/submariner#794
Signed-off-by: Daniel Farrell <[email protected]>
(cherry picked from commit 8f2af1f)
skitt pushed a commit to skitt/shipyard that referenced this issue Feb 22, 2023
Scan Go dependencies for known vulnerabilities.

Run on PRs to gate on vulns negligible or higher.
Also run on merges to devel and release branches to report results on
the GitHub Code Scanning tab.

Ignore two false positives.

Relates-to: submariner-io/submariner#794
Signed-off-by: Daniel Farrell <[email protected]>
(cherry picked from commit 8f2af1f)
skitt pushed a commit to submariner-io/shipyard that referenced this issue Feb 23, 2023
Scan Go dependencies for known vulnerabilities.

Run on PRs to gate on vulns negligible or higher.
Also run on merges to devel and release branches to report results on
the GitHub Code Scanning tab.

Ignore two false positives.

Relates-to: submariner-io/submariner#794
Signed-off-by: Daniel Farrell <[email protected]>
(cherry picked from commit 8f2af1f)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
automation cncf priority:medium size:medium This can be implemented in a single sprint
Projects
None yet
Development

No branches or pull requests

6 participants