The document discusses finding security vulnerabilities in open source software before attackers can exploit them. It notes that open source packages often have dependencies with vulnerabilities and that vulnerabilities in popular packages can affect many users. It advocates for making security easier and more developer-friendly to integrate into the development process. It also provides best practices for open source maintainers such as having a responsible disclosure policy, scanning for vulnerabilities, and promptly releasing security fixes.
1 of 47
Download to read offline
More Related Content
Stranger Danger - Finding vulnerabilities before they find you - Liran Tal 2021
10. @liran_tal
Dependency on China and other adversary countries
for some of our most critical supply chains threatens to
undermine the trustworthiness of critical technologies
and components that constitute and connect to
cyberspace.
source: https://www.solarium.gov/public-communications/supply-chain-white-paper
Protecting supply chains
from compromise
Establishing a Center for
Open-Source Software
Security
34. @liran_tal
Top 10 US
Computer Science
Programs
Carnegie Mellon
MIT
Stanford
University of California, Berkeley
University of Illinois, Urbana-Champaign
Cornell
University of Washington
Georgia Tech
Princeton
University of Texas, Austin
source: http://tiny.cc/o98gdz
45. @liran_tal
Have a responsible disclosure policy
Enable 2FA, protect your users
Scan often and 鍖x your dependencies
Release security 鍖xes as non-major
https://snyk.io/blog/ten-npm-security-best-practices