遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/6366)
<a href="https://www.bestpractices.dev/projects/6366"><img src="https://www.bestpractices.dev/projects/6366/badge"></a>
The network telemetry engine for data-driven security investigations.
https://github.com/tenzir/vast/graphs/contributors
Tenzir (https://tenzir.com) is the startup that owns and runs the VAST project. There are several engineers and co-owners of key resources in place to ensure continuity in fatal scenarios.
Repository on GitHub, which uses git. git is distributed.
The testing is invocable using cmake; run the build targets 'integration' to run integration tests, and 'test' to run unit tests.
警告:需要URL,但找不到URL。
There is extensive CI that is required to succeed before a PR may be merged; every change has to go through the PR workflow. See here for a list of past runs: https://github.com/tenzir/vast/actions
VAST offers secure transport-layer encryption via CAF, which leverages OpenSSL.
https://github.com/actor-framework/actor-framework/tree/master/libcaf_openssl
VAST uses CAF for transport-layer encryption via recent OpenSSL versions that support TLS v1.2.
// X-Content-Type-Options was not set to "nosniff".
There are additional checks at runtime enforced via assertions for non-release builds. There is a suite of end-to-end tests that must pass CI here, that all run with assertions enabled: https://github.com/tenzir/vast/blob/master/vast/integration/vast_integration_suite.yaml
We are in the process of integrating fuzzing via Code Intelligence. There's a WIP example here that we intend to upstream in the near future: https://github.com/tenzir/vast-fuzzing
This is not currently being done before every release, but will be automated in the future.
Assertions are enabled by default for debug builds, see https://github.com/tenzir/vast/blob/017de2f9ec156c80655ec6ac3765a2476a2142b3/CMakeLists.txt#L361-L379
后退