Início
Conheça mais
Enviar pesquisa
Carregar
Entrar
Cadastre-se
Anúncio
Check these out next
Conversation on Open Source - CU Boulder - Feb 2017
Jason Carolan
On making standards organizations & open source communities work hand in hand
Benjamin Cabé
Managing Open Source Software Supply Chains
nexB Inc.
[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...
WSO2
Leaping the chasm from proprietary to open: A survivor's guide
bcantrill
Scanning Docker Images with ScanCode.io
Michael Herzog
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...
South Tyrol Free Software Conference
FLOSS development
Frederik Questier
1
de
18
Top clipped slide
“State of the Tooling” in Open Source Automation
31 de Mar de 2023
•
0 gostou
0 gostaram
×
Seja o primeiro a gostar disto
mostrar mais
•
33 visualizações
visualizações
×
Vistos totais
0
No Slideshare
0
De incorporações
0
Número de incorporações
0
Baixar agora
Baixar para ler offline
Denunciar
Software
“State of the Tooling” in Open Source Automation
Shane Coughlan
Seguir
OpenChain Program Manager em The Linux Foundation
Anúncio
Anúncio
Anúncio
Recomendados
OpenChain Mini-Summit 2023 - State of Tooling in Open Source Automation
Shane Coughlan
183 visualizações
•
22 slides
Introduction to License Compliance and My research (D. German)
dmgerman
180 visualizações
•
120 slides
Open-Source Software Panel - IP Track
Aaron G. Sauers, CLP
76 visualizações
•
22 slides
LCA14: LCA14-110: FLOSS Training
Linaro
3.2K visualizações
•
17 slides
Selecting an Open Source License and Business Model for Your Project to Have ...
All Things Open
54 visualizações
•
15 slides
SFO15-TR1: The Philosophy of Open Source Development
Linaro
702 visualizações
•
20 slides
Mais conteúdo relacionado
Similar a “State of the Tooling” in Open Source Automation
(20)
Conversation on Open Source - CU Boulder - Feb 2017
Jason Carolan
•
350 visualizações
On making standards organizations & open source communities work hand in hand
Benjamin Cabé
•
6K visualizações
Managing Open Source Software Supply Chains
nexB Inc.
•
1.6K visualizações
[Workshop] Building an Integration Agile Digital Enterprise with Open Source ...
WSO2
•
782 visualizações
Leaping the chasm from proprietary to open: A survivor's guide
bcantrill
•
6.5K visualizações
Scanning Docker Images with ScanCode.io
Michael Herzog
•
70 visualizações
SFScon19 - Alexios Zavras - Free Software in the industry a view from the lar...
South Tyrol Free Software Conference
•
76 visualizações
FLOSS development
Frederik Questier
•
201 visualizações
Open Source Licenses
Ortus Solutions, Corp
•
4 visualizações
Choisir le bon business model et la bonne licence pour la survie de son proje...
Open Source Experience
•
36 visualizações
Managing the Software Supply Chain: Policies that Promote Innovation While Op...
FINOS
•
84 visualizações
Benefits of Opensource Products
Anju Merin
•
225 visualizações
Social Code Scanning
Symphony Software Foundation
•
144 visualizações
Open Source Software Concepts
JITENDRA LENKA
•
1.5K visualizações
Open soucre(cut shrt)
Shivani Rai
•
426 visualizações
Opensource wildey
Richard Jobity
•
259 visualizações
The adoption of FOSS workfows in commercial software development: the case of...
dmgerman
•
658 visualizações
Open Source Governance at HP
Bruno Cornec
•
2.8K visualizações
open source technology
Lila Ram Yadav
•
2K visualizações
Vimeo and Open Source (SMPTE Forum 2015)
Derek Buitenhuis
•
122 visualizações
Mais de Shane Coughlan
(20)
2023-06-classic
Shane Coughlan
•
21 visualizações
2023-06-cute
Shane Coughlan
•
21 visualizações
2023-06-corporate
Shane Coughlan
•
25 visualizações
legal-work-group-2023-05-25
Shane Coughlan
•
22 visualizações
OpenChain Japan Work Group - Meeting 27
Shane Coughlan
•
79 visualizações
FOSSLight at the OpenChain Mini-Summit May 2023
Shane Coughlan
•
166 visualizações
OpenChain Mini-Summit May 2023
Shane Coughlan
•
186 visualizações
How the Linux Foundation Standards for Compliance and Security will Fix Your ...
Shane Coughlan
•
49 visualizações
Standardizing Open Source Risk - LLW - 2023-04
Shane Coughlan
•
24 visualizações
OpenChain Education Work Group - 2023-04-13
Shane Coughlan
•
32 visualizações
The State of Open Source for Software Alliance Germany 2023-04-14
Shane Coughlan
•
46 visualizações
OpenChain North America and Europe Meeting - 2023-04-04
Shane Coughlan
•
22 visualizações
OpenChain Webinar #50 - An Overview of SPDX 3.0
Shane Coughlan
•
232 visualizações
OpenChain Monthly Meeting - North America / Asia - 2023-03-21
Shane Coughlan
•
66 visualizações
OpenChain Monthly Meeting 2023-02-21 (North America and Asia)
Shane Coughlan
•
61 visualizações
OpenChain Monthly Meeting North America - Europe - 2023-02-07
Shane Coughlan
•
96 visualizações
OpenChain Overview Slides - 02-2023
Shane Coughlan
•
174 visualizações
OpenChain-Monthly-Meeting-2023-01-17
Shane Coughlan
•
44 visualizações
OpenChain Monthly Meeting (US / Europe) 2023-01-03
Shane Coughlan
•
74 visualizações
Open Compliance Summit - Export Control Informal Discussion
Shane Coughlan
•
34 visualizações
Anúncio
Último
(20)
Woke Up This Morning: The Definitive Oral History of The Sopranos
denisehawkins7
•
0 visão
Growth Strategy
Prasanna Hegde
•
0 visão
CLOUD_COMPUTING_AWS_TRAINING.pptx
MohammadSamiuddin10
•
0 visão
ProfitBot AI
AyanKhan479203
•
0 visão
Daughter of the Deep
megedwards5
•
0 visão
Automatic System for Detection and Classification of Brain Tumors
Fatma Sayed
•
0 visão
CS283-PublicKey.ppt
ShounakDas16
•
0 visão
From Blood and Ash (Blood and Ash, #1)
megedwards5
•
0 visão
pmk.docx
fairy70
•
0 visão
It Consulting & Services - Black Basil Technologies
Black Basil Technologies
•
0 visão
Confluent Partner Tech Talk with SVA
confluent
•
0 visão
Object Oriented Programming
Muhammad Jahanzaib
•
0 visão
The Hawthorne Legacy (The Inheritance Games, #2)
megedwards5
•
0 visão
Why We Sleep: Unlocking the Power of Sleep and Dreams
megedwards5
•
0 visão
Station Eleven
megedwards5
•
0 visão
Normal People
megedwards5
•
0 visão
Untamed
megedwards5
•
0 visão
Dog Shaming 2022 Day-to-Day Calendar
megedwards5
•
0 visão
Some benefits of hiring Offshore Development Team.pdf
Go-Tech Solution
•
0 visão
Production-ready GraphQL with Caliban
Pierre Ricadat
•
0 visão
“State of the Tooling” in Open Source Automation
Copyright © nexB
Inc. License: CC-BY-SA-4.0 “State of the Tooling” in Open Source Automation OpenChain German work group Philippe Ombredanne, AboutCode.org nexB Inc.
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Philippe Ombredanne ► Project lead and maintainer for VulnerableCode, ScanCode and AboutCode ► Creator of Package URL, co-founder of SPDX & ClearlyDefined ► FOSS veteran, long time Google Summer of Code mentor ► Co-founder and CTO of nexB Inc., makers of DejaCode ► Weird facts and claims to fame ● Signed off on the largest deletion of lines of code in the Linux kernel (but these were only comments) ● Unrepentant code hoarder. Had 60,000+ GH forks now down only to 20K forks ► pombredanne@nexb.com irc:pombreda
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Why open source compliance tooling? ▷ Because open source for open source: This is the way! ● Dogfooding ▷ Free as in beer and freedom of course ● Code of course, but do not forget the data! ▷ Key to enable right-sized automation for your open chain ▷ Best-in-class tools in several areas
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Key trends (1) Time to retool? ▷ 3rd wave of Compliance tooling creation and adoption underway ● 1st wave was commercial ● 2nd wave was centered on license compliance and legal ● 3rd wave will be centered on developers and appsec ■ Eventually balanced and holistic FOSS solutions ▷ TODO: Review your existing approach and retool
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Key trends (2) ▷ Security is top of mind ● SBOMs are everywhere, but for what? Few can process them ▷ And license compliance is not yet solved ● Still a lot of work left for automation ● Emerging scripting platforms to capture your pipelines ■ Orchestrate many tools ▷ Open data and data sharing will happen ● Everybody wants it, but also everyone wants to control it ● Centralized or decentralized?
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Key trends (3) ▷ Software health, quality, sustainability are not yet on the radar ▷ FOSS GUI/Web apps are still badly missing ▷ Slowly the analysis of builds and binaries will displace source-only scans ▷ Dependency tracking is not yet solved at scale
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Key trends (4) Best tools are FOSS ▷ The leading tools are mostly FOSS first ● License detection ● Container analysis ● Package detection ● Dependency tracking and resolution ▷ But BEWARE ● Lots of tools are shallow and look only skin deep ■ Barely suitable for serious license or security work ● Do your homework and try the tools: they are open after all
Copyright © nexB
Inc. License: CC-BY-SA-4.0 ▷ Vulnerability and package databases are the new rush ● Open or commercial vulnerability databases with supposedly "premium" content ● But BEWARE of the data quality. Size DOES NOT matter. ■ Made up packages, made up versions ■ Not worth their price: Compare and include open solutions! ▷ Every commercial tool now includes license data ● License data derived from package manifest is NOT ENOUGH ● Built-in policies are impractical: is GPL always bad?? Key trends (5) Poor data quality
Copyright © nexB
Inc. License: CC-BY-SA-4.0 PURL is emerging as the glue to avoid lock-in! ● Started to support package ids in ScanCode and VulnerableCode, now everywhere ○ CycloneDX ○ SPDX including just released GitHub SPDX SBOMs features ○ Google OSV ○ Sonatype OSSIndex ○ New PurlDB, MatchCode ○ Most FOSS tools such as ORT, Fosslight, DependencyTrack, Anchore, Tern and most of the open (and prioprietary) SCA and Infosec/Appsec tools ● Coming to the NVD in version 5.1!! ● Key vector for interop: if two tools speak PURL, integration is made easier ● Demand its adoption by your vendors and projects Key trends (6) PURL is the essential glue
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Key insights (1): Share the data! "I would like to have automation to avoid repeat work when re-running tools" "Let's avoid re-running scans, share them and reuse them instead" ● Everyone wants to share and reuse data from scans, and origin and license data ○ Speed up origin and license review ○ Avoid redoing the scans and the same review either inside my org or across orgs ● But "It is hard to overcome lawyers’ objections to sharing data such as license conclusions and curations" ● And how to trust the scans and curations? And deal with different policies and standards for conclusions and curations? (specifically about licensing) ● What is the motivation and ease for public data sharing?
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Key insights (2): Open the data! ● Open data (e.g., as in free and open licensed data on FOSS) are emerging ○ The too big to share argument will not hold ● Eventually open, community curated FOSS package "knowledge bases" will become the norm and supplant proprietary, closed source alternatives ● We should share raw scanners/tools outputs first ● We should fix upstream licensing issues, upstream ● The centralized approach does not work well ○ Too big to share ○ Out of date ○ Lack of trust in centralized control
Copyright © nexB
Inc. License: CC-BY-SA-4.0 License and Vulnerability are like oil and vinegar ● Even if core process is code origin determination, constituents are not the same (yet) ○ License folks care less about Vulnerabilities ○ Security folks care less about Licenses ● FOSS projects that cater to both should provide differentiated documentation for each audience ● Some core tools are the same, but users are different ● Expect a convergence of the two aspects in the future ● Until then, advice to OSPOs: ○ Handle both domains ○ But adapt your language to each constituent/persona Key insights (3) Licensing != Security?
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Multiple FOSS projects try to solve license compatibility ● FLICT, OSADL, Hermine Oniro ● Automating license conflicts/compatibility checks is a real problem at scale ● Projects may work together and eventually some conventions will emerge ● Key domains ○ Help legal understand/zoom in on key license concerns ○ What is the effect of multiple licenses? ○ How to surface license compatibility issues ● Effective/resulting license inference and compatibility is a policy issue ○ But tooling can automate the grunt work Key insights (4) License Compatibility
Copyright © nexB
Inc. License: CC-BY-SA-4.0 ● Does copying a snippet of code really matter? ○ Have you looked at the big rocks first? e.g., whole libraries ○ Are you ready to pay the price in time and/or cash? Image credits: https://www.integrativenutrition.com/ Key insights (5) Snippets and matching?
Copyright © nexB
Inc. License: CC-BY-SA-4.0 ● Domain has been abandoned by commercial vendors ○ Snyk has spun off FOSSID ○ Synopsys mostly abandoned Protex ● One new entrant with open source code but proprietary data: SCANOSS ● Snippets may not matter (too much) ● But AI/ML-generated code snippets anyone? ○ Will Artificial general intelligence (AGI) make snippets both more relevant and useless at the same time when everyone can generate the same boilerplate derived from everyone's code ● Yet code matching can speed up the analysis when done right (find big rocks first) ○ Reuse previous analysis based on matching code: WIP with MatchCode Key insights (5) Snippets and matching?
Copyright © nexB
Inc. License: CC-BY-SA-4.0 ● SBOMs are everywhere ○ GitHub can even create these directly from a repo ○ But what about data quality (depth and breadth)? ○ But what about using proper machine readable identifiers (license, PURL)? ● Hi-Fi or Lo-Fi SBOMs? ● Every tool creates SBOMs but then what? ○ 2 out of 50+ folks were effectively consuming SBOMs ● Big gaps in tool-to-tool integration ● Too much over engineering, and under-specification ● Advice: Ignore the SPDX vs. CycloneDX feud and embrace both, with PURL ○ Feel free to ignore SWID ○ SBOM is just a reporting format Key insights (6) SBOM, mehBOM?
Copyright © nexB
Inc. License: CC-BY-SA-4.0 ● Collaborate: License conflict/compatibility checking FOSS projects on data and standards (FLIct/OSADl/Hermie) ● Create: A live inventory of all FOSS tools and their capabilities ● Share: Approaches to dependency detection/resolution/processing ● Define: Evolve a standard/schema for tool-to-tool technical scan data sharing ● DATA: Exchange data! Follow up on collaboration opportunities?
Copyright © nexB
Inc. License: CC-BY-SA-4.0 Credits ▷ Presentation template by SlidesCarnival licensed under CC-BY-4.0 ▷ Photograph by Unsplash licensed under Unsplash License ▷ Other content licensed under CC-BY-SA-4.0 18
Anúncio