-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create rule S7205: Dependencies should be verified against a known checksum or signature #4702
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM in general! Just some minor things in the comments.
rules/S7205/kotlin/rule.adoc
Outdated
@@ -0,0 +1,85 @@ | |||
Software projects often rely on external code libraries, known as dependencies. Package managers such as Gradle, allow developpers to reference dependencies for their projects. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Software projects often rely on external code libraries, known as dependencies. Package managers such as Gradle, allow developpers to reference dependencies for their projects. | |
Software projects often rely on external code libraries, known as dependencies. Package managers, such as Gradle, allow developers to reference dependencies for their projects. |
rules/S7205/kotlin/rule.adoc
Outdated
|
||
== Why is this an issue? | ||
|
||
Failing to verify the integrity of dependencies before using them is a significant security problem. It exposes your application, and potentially your users, to several risks. The core issue is that you're running code from an untrusted source without checking it, effectively giving an attacker a direct pathway into your application. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Failing to verify the integrity of dependencies before using them is a significant security problem. It exposes your application, and potentially your users, to several risks. The core issue is that you're running code from an untrusted source without checking it, effectively giving an attacker a direct pathway into your application. | |
Failing to verify the integrity of dependencies before using them is a significant security problem. It exposes your application, and potentially your users, to several risks. The core issue is that you are running code from an untrusted source without checking it, effectively giving an attacker a direct pathway into your application. |
As per styling guide for RSPEC.
rules/S7205/kotlin/rule.adoc
Outdated
|
||
Failing to verify the integrity of dependencies before using them is a significant security problem. It exposes your application, and potentially your users, to several risks. The core issue is that you're running code from an untrusted source without checking it, effectively giving an attacker a direct pathway into your application. | ||
|
||
This is often a key component of what's called a "supply chain attack." The attacker isn't directly attacking your application. Instead, they're attacking a component you use. This is an important consideration because the attack's source is less obvious. You might diligently secure your own code, but overlook the risk introduced by external dependencies. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is often a key component of what's called a "supply chain attack." The attacker isn't directly attacking your application. Instead, they're attacking a component you use. This is an important consideration because the attack's source is less obvious. You might diligently secure your own code, but overlook the risk introduced by external dependencies. | |
This is often a key component of what's called a "supply chain attack." The attacker is not directly attacking your application. Instead, they're attacking a component you use. This is an important consideration because the attack's source is less obvious. You might diligently secure your own code, but overlook the risk introduced by external dependencies. |
As per styling guide for RSPEC.
Co-authored-by: Hendrik Buchwald <64110887+hendrik-buchwald-sonarsource@users.noreply.github.com>
|
|
@@ -0,0 +1,9 @@ | |||
Software projects often rely on external code libraries, known as dependencies. Package managers such as Gradle, allow developpers to reference dependencies for their projects. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Software projects often rely on external code libraries, known as dependencies. Package managers such as Gradle, allow developpers to reference dependencies for their projects. | |
Software projects often rely on external code libraries, known as dependencies. Package managers such as Gradle, allow developers to reference dependencies for their projects. |
You can preview this rule here (updated a few minutes after each push).
Review
A dedicated reviewer checked the rule description successfully for: