遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/5380)
<a href="https://www.bestpractices.dev/projects/5380"><img src="https://www.bestpractices.dev/projects/5380/badge"></a>
This tool helps you find known vulnerabilities in your supply chain/dependencies. It can take a known component list in several formats (including SBOM) or includes a binary scanner to discover a number of common, vulnerable components (including openssl, libpng, libxml2, expat)..
Top 5 contributors are unassociated (other than through this project, anyhow) https://github.com/intel/cve-bin-tool/graphs/contributors
Files use SPDX header: https://github.com/intel/cve-bin-tool/blob/main/spdx_header.txt
Repository on GitHub, which uses git. git is distributed.
https://github.com/intel/cve-bin-tool/issues?q=is%3Aissue+is%3Aopen+label%3A%22good+first+issue%22
https://github.com/intel/cve-bin-tool/blob/main/CONTRIBUTING.md#code-review
Almost all code reviewed by a non-author contributor: https://github.com/intel/cve-bin-tool/pulls -- only a few urgent CI related issues get merged without review beforehand, and many of those receive review after the fact.
Interested parties can validate against https://github.com/intel/cve-bin-tool/releases and https://pypi.org/project/cve-bin-tool/
Uses pytest https://github.com/intel/cve-bin-tool/tree/main/test#readme
https://github.com/intel/cve-bin-tool/actions
We're currently relying on the requests library and python's urlib functionality for https connection. These mechanisms are kept up to date with appropriate default algorithms. Users could change the code to use other preferred options if they wanted to, although we're limited by what our data sources provide.
Found all required security hardening headers. https://pypi.org/project/cve-bin-tool/ https://github.com/intel/cve-bin-tool/
Handled as part of Intel SDL process
Various methods used. https://github.com/intel/cve-bin-tool/
Initial fuzzing has been done after the 3.1.1 release, nothing significant found so far. More targeted fuzzing done for 3.2 release. We have not yet set this up to run regularly.
Python assert is optimized out during normal compilation, so we only use it for tests as is normal best practice for the language. The way fuzzing is currently run assertions would be enabled, but it's sort of a moot point if there are no assertions in the code so marking this as "met" may not mean much.
后退