Giter Club home page Giter Club logo

pkg-vuln-collab-space's People

Contributors

darcyclarke avatar wesleytodd avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

pkg-vuln-collab-space's Issues

Recurring Meeting

We need to pick a time for a recurring meeting. As we will be announcing the Collab Space officially around the OpenJS World Event, we should shoot for the first one being the week right after. The consensus from the folks on the kick off call was Tuesday morning is the best time. That means the first meeting would be Tuesday June 8th. To make sure we most effectively use our time I propose we start with a monthly cadence to the meetings.

First Meeting (All times PST, more timezones in the links):

Monday June 7th

๐Ÿ‘Ž 8:00 am
๐Ÿš€ 9:00 am
๐Ÿ˜• 10:00 am

Tuesday June 8th (All times PST, more timezones in the links)

๐Ÿ‘€ 8:00 am
๐ŸŽ‰ 9:00 am
โค๏ธ 10:00 am

Vote for as many times as you can attend. Additionally, once we get a feel for the regular attendance we can re-evaluate and do alternating times if necessary.

Next Steps for this Space

  • @darcyclarke @wesleytodd to set up & coordinate the meeting cadence (first call)
  • determine reporting mechanism/style (ex. monthly status report at CPC meetings)
  • kick-off new project board to track items in flight
  • determine first set of todos/questions to answer in call

Googles Unified Vulnerability Schema

https://security.googleblog.com/2021/06/announcing-unified-vulnerability-schema.html

This new vulnerability schema aims to address some key problems with managing vulnerabilities in open source. We found that there was no existing standard format which:

  • Enforces version specification that precisely matches naming and versioning schemes used in actual open source package ecosystems. For instance, matching a vulnerability such as a CVE to a package name and set of versions in a package manager is difficult to do in an automated way using existing mechanisms such as CPEs.
  • Can be used to describe vulnerabilities in any open source ecosystem, while not requiring ecosystem-dependent logic to process them.
  • Is easy to use by both automated systems and humans.

This is the gist of it:

{
        "id": string,
        "modified": string,
        "published": string,
        "withdrawn": string,
        "aliases": [ string ],
        "related": [ string ],
        "package": {
                "ecosystem": string,
                "name": string,
                "purl": string,
        },
        "summary": string,
        "details": string,
        "affects": [ {
                "ranges": [ {
                        "type": string,
                        "repo": string,
                        "introduced": string,
                        "fixed": string
                } ],
                "versions": [ string ]
        } ],
        "references": [ {
                "type": string,
                "url": string
        } ],
        "ecosystem_specific": { see spec },
        "database_specific": { see spec },
}

Here is the spec doc: https://docs.google.com/document/d/1sylBGNooKtf220RHQn1I8pZRmqXZQADDQ_TOABrKTpA/edit

Planning for Kick-Off

To get the collab space kicked off, we are going to be running a session at OpenJS World 2021. To get this planned, we would like to do a session sometime early next week. Our proposed agenda (open for discussion to make sure we cover the most important things):

  1. Introductions
  2. Quick recap of the scope/proposal
  3. Outline plan for the session
  4. Assign action items and schedule next meeting

To make sure the most folks who want to participate can attend we thought we would open up a short vote. All times are PST.

Monday May 10th

  • ๐Ÿ‘ 7:00 am
  • ๐Ÿ‘Ž 11:00 am
  • ๐Ÿ˜„ 12:00 pm
  • ๐Ÿš€ 1:00 pm

Tuesday May 10th

  • ๐Ÿ‘€ 7:00 am
  • ๐ŸŽ‰ 8:00 am
  • ๐Ÿ˜• 12:00 pm
  • โค๏ธ 1:00 pm

Vote for as many as you can attend and we will choose the best time (with the added restriction that both @darcyclarke and I can attend as the champions). We will leave this open until Friday, so get your votes in if you would like to attend.

cc @pkg-vuln-collab-space (looks like this doesn't work yet?)
@naugtur @boneskull @mhdawson @dominykas @ljharb @MarcinHoppe @rginn

Aligning Incentives

One constant in this discussion has been how we align incentives across the process. Today we only seem to align on one goal: "improving security". But at what cost? Today different parts of the ecosystem make decisions without considering the impact those decisions have on other parts. I would like to provide a forum here for folks to discuss what their incentives structures are, so we can better understand where they overlap and where the diverge.

Maybe we can start here with brainstorming with some user story style perspectives, but I would like to make a doc in the repo about this at some point. I will start with my incentives:

  1. As a maintainer of OSS projects, I want to help my users be the most secure they can. This means responding to security issues quickly and efficiently.
  2. As a maintainer of OSS projects, I do not want false positives clogging up my inbox and brain.
  3. As an employee at a technology company, I want security issues surfaced so I can assess them. I want them to come with enough context that I can understand the issue and address it in my companies products.
  4. As a member of a team dedicated to developer productivity, I want solutions which reduce the burden on the developers I support and improves their ability to assess and remediate security issues.
  5. As a human person who donates my free time, I want to have hobbies that are not merging dependabot PRs and talking with security professionals about the applicability of a CVE on my projects.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.