Replies: 11 comments
-
Note that this would be not enhancement - it just leads to a pointless confusion such as in openstreetmap/iD#5463 (comment)
Maybe it is possible to do it well, but please do not base anything on anything done by npm. |
Beta Was this translation helpful? Give feedback.
-
@matkoniecz great context. I'm not here to praise snyk vs npm audit but there's definitely a lot of room for improvement on npm's part that indeed causes a lot of the fatigue you referenced, for example:
I'd like to see where we can help with our APIs and vulnerability dataset, whether it is for the CLI tools or for the website. |
Beta Was this translation helpful? Give feedback.
-
The rubygems team would be happy to hear about any ideas/proposals ideas you have, but please be understandable that we are very cautious about integrating with any 3rd party systems and have a strong preference for managing data/functionality ourselves. |
Beta Was this translation helpful? Give feedback.
-
Maybe it would be better first as a separate CLI tool allowing to evaluate whatever it is useful at all? In addition to npm case - similar attempt by Github keeps spamming my inbox about irrelevant supposed security issues (things that are problem solely in software accepting user input in software that never accept user input from untrusted users and so on). |
Beta Was this translation helpful? Give feedback.
-
With regards to testing out the capabilities you can already do that in various ways, and snyk is free for open source devs and maintainers:
More about snyk ruby support over here. @colby-swandale totally understood, and makes sense too. we're happy to provide you with any of the APIs you need to get security badges up on rubygems.org for packages, or to integrate with the CLI for more integrated feel. I'd say further more, we could push a vulnerabilities feed down your end of the infra and then you just integrate everything internally without an actual 3rd party API call on the website or the CLI. We genuinely want to help the community and it's more than just helping out with the vulnerability database and also extends to our security analysts. We handle disclosures and report about ruby gems security issues today and would be happy to help where we can and connect ruby's security team with snyk's for anywhere we can help out, whether it is triaging, providing fixes, or alerting rubygems.org security folks or the gem's maintainers directly if needed for an early heads up. |
Beta Was this translation helpful? Give feedback.
-
I have not found reasonable way to install it, but I noticed mandatory I hope that such requirement to authenticate with Snyk would be gone from anything appearing in rubygems.org software, especially things enabled by default. |
Beta Was this translation helpful? Give feedback.
-
Good feedback. What would be an ideal way for ruby developers to consume the snyk CLI? I assume a gem? what would be the next best thing? :-) Needless to say, a further 'auth' type of things won't be necessary. The relevant ruby CLI could hit an anonymous endpoint on our end, or we'll push the data to rubygems own system and it will query its own, whichever suits best really. |
Beta Was this translation helpful? Give feedback.
-
Yes, when I am installing ruby tool I expect |
Beta Was this translation helpful? Give feedback.
-
Would using |
Beta Was this translation helpful? Give feedback.
-
I use solely Linux so it is hard for me to comment what is preferred/normal/used among Windows/Apple users (and even for Linux it is strongly personal opinion). Though I consider Docker containers to be quite weird overkill, useful in cases where someone build extremely complex tool. What sometimes is needed but from description this tool seems like a simple blacklist of insecure versions. |
Beta Was this translation helpful? Give feedback.
-
Completely agree. Also a friendly ping to @colby-swandale @hsbt. |
Beta Was this translation helpful? Give feedback.
-
I'm having a problem or would like to suggest a feature.
This issue is related to:
gem
Hey folks,
Liran from Snyk (open source security) here 👋
Me and my team have been spending some time recently working with the community to increase the security awareness for developers as they use dependencies. A good couple of examples of that which we've done already with community folks are a small widget on jsDelivr and CDNjs like this.
I'd be keen on exploring some ideas I have about integrating a quick widget on package pages, or even further enhancing the gem/bundler CLI with vulnerability insights on install, much like
npm install
does by default. The RubyGems vulnerabilities database (and other ecosystems) is already open https://snyk.io/vuln?type=rubygems and we could make APIs available to tie all of this up.Happy to jump on a call or discuss further here/elsewhere if this is interesting for the community.
or like this on yarnpkg:
I will abide by the code of conduct.
Beta Was this translation helpful? Give feedback.
All reactions