-
Notifications
You must be signed in to change notification settings - Fork 10
MB-88: Define security checks to perform on projects #79
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
xredo
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I have left some comments to provide more information and context to some of the topics covered in the changes.
The rest is great!
|
|
||
| [Snyk](https://snyk.io/) is one such tool. It is cross-platform and allows detecting vulnerabilities in several language runtimes, in Docker images, Infrastructure-as-Code definitions, and Open Source dependencies. | ||
|
|
||
| We will also check the dependency scanner built in GitHub or GitLab. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As we don't use Gitlab, we can leave just Github and offer more details. Those are the official instructions to enable dependabot in Github projects:
https://docs.github.com/en/code-security/getting-started/dependabot-quickstart-guide
| - Tools or lint rules should flag: | ||
| - Any usage of dangerouslySetInnerHTML without sanitization | ||
| - Dynamic calls to child_process | ||
| - Dynamic require() using untrusted data | ||
| - Unvalidated users or session access |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Currently we are using ESLint for our projects. So we can mention specific rules that we can use to enforce this:
- Any usage of dangerouslySetInnerHTML without sanitization: eslint-plugin-react has react/no-danger
- Dynamic calls to child_process: eslint-plugin-security has security/detect-child-process
- Dynamic require(): eslint-plugin-import: import/no-dynamic-require
- Unvalidated users or session access: I don't know any ESLint rule for this. I don't iknow if we can force this.
| - _docker scan_ or platform-provided scanners | ||
| - Snyk container scanning | ||
| - Make sure the containers are built on top of OS images that are still supported and receiving security upgrades. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍
| ## Logging, Monitoring & Alerts | ||
|
|
||
| Check that: | ||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
All good 👍
Reason for change
Closes # .
List of Changes
Checklist