Red Hat's Dependency Analytics (RHDA) extension gives you awareness to security concerns within your software supply chain while you build your application. The Dependency Analytics extension uses the Snyk REST API to query Snyk's Vulnerability Database for the most up-to-date vulnerability information available. Snyk uses industry-leading security intelligence by pulling from many data sources to give you exact vulnerability information.
NOTE:
The Red Hat Dependency Analytics extension is an online service hosted and maintained by Red Hat.
Dependency Analytics only accesses your manifest files to analyze your application dependencies before displaying the vulnerability report.
IMPORTANT:
Currently, Dependency Analytics only supports projects that use Maven (mvn
), and Node ecosystems (npm
).
In future releases, Red Hat plans to support other programming languages.
- Quick start
- Configuration
- Features
- Using Red Hat Dependency Analytics for CI builds
- Know more about the Red Hat Dependency Analytics platform
- Data and telemetry
- Support, feedback & questions
- License
Prerequisites
- For Maven projects, analyzing a
pom.xml
file, you must have themvn
binary in your system’sPATH
environment. - For Node projects, analyzing a
package.json
file, you must have thenpm
binary in your system’sPATH
environment.
IMPORTANT:
Visual Studio Code by default executes binaries directly in a terminal found in your system's PATH
environment.
You can configure Visual Studio Code to look somewhere else to run the necessary binaries.
You can configure this by accessing the extension settings.
Click the Workspace tab, search for the word executable, and specify the absolute path to the binary file you want to use for Maven or Node.
Procedure
- Install Visual Studio Code on your workstation.
- After the installation finishes, open the Visual Studio Code application.
- From the file menu, click View, and click Extensions.
- Search the Marketplace for Red Hat Dependency Analytics.
- Click the Install button to install the extension.
- To start scanning your application for security vulnerabilities, and view the vulnerability report, you can do one of the following:
- Open a manifest file, hover over a dependency marked by the inline Component Analysis, indicated by the wavy-red line under a version number or dependency name, click Quick Fix, and click Detailed Vulnerability Report.
- Open a manifest file, and click the pie chart icon .
- Right click on a manifest file in the Explorer view, and click Red Hat Dependency Analytics Report....
- From the vulnerability pop-up alert message, click Open detailed vulnerability report.
- (OPTIONAL) You can link your Snyk account to Dependency Analytics by doing the following:
- Log into your Snyk account.
- On the account landing page, you can find your Snyk Token, copy the token.
- Open the Red Hat Dependency Analytics extension settings.
- Click the Workspace tab.
- Paste the Snyk token in the Exhort Snyk Token field.
- After adding your Snyk token, the vulnerability report gives you detailed information about security vulnerabilities unique to Snyk, and vulnerabilities that have publicly known exploits.
The Red Hat Dependency Analytics extension has some configurable parameters that allows you to customize its behavior according to your preferences.
Procedure
-
Open the Visual Studio Code application.
-
From the file menu, click View, and click Extensions.
-
Find the installed Red Hat Dependency Analytics extension, and click on the Gear icon.
-
Click Extension Settings.
Exhort Snyk Token :
The Snyk token allows Exhort to authenticate with the Snyk Vulnerability Database.
If a Snyk token is not provided, Snyk vulnerability information is not displayed.
If you leave this field blank, the following informational message is displayed.
If you enter a invalid Snyk token, a pop-up message alerts you that your Snyk token is not valid.
If you need a new Snyk token, you can generate a new token here.
Red Hat Dependency Analytics Report File Path :
Specify the local path to create the Dependency Analytics report file.
The default path is /tmp/redhatDependencyAnalyticsReport.html
.
-
Component analysis
Upon opening a manifest file, such as apom.xml
orpackage.json
file, a scan starts the analysis process. The scan provides immediate inline feedback on detected security vulnerabilities for your application's dependencies. Such dependencies are appropriately underlined in red, and hovering over it gives you a short summary of the security concern. The summary has the full package name, version number, the amount of known security vulnerabilities, and the highest severity status of said vulnerabilities.NOTE: Add the
target
folder to your.gitignore
file to exclude it from Git monitoring. -
Excluding dependencies with
exhortignore
You can exclude a package from analysis by marking the package for exclusion. If you wish to ignore vulnerabilities for a dependency in apom.xml
file, you must addexhortignore
as a comment against the dependency, group id, artifact id, or version scopes of that particular dependency in the manifest file. For example:<dependency> <!--exhortignore--> <groupId>...</groupId> <artifactId>...</artifactId> <version>...</version> </dependency>
If you wish to ignore vulnerabilities for a dependency in a
package.json
file, you must addexhortignore
as a attribute-value pair. Ifexhortignore
is followed by a list of comma-separated Snyk vulnerability IDs, only the listed vulnerabilities will be ignored during analysis. For example:{ "name": "sample", "version": "1.0.0", "description": "", "main": "index.js", "keywords": [], "author": "", "license": "ISC", "dependencies": { "dotenv": "^8.2.0", "express": "^4.17.1", "jsonwebtoken": "^8.5.1", "mongoose": "^5.9.18" }, "exhortignore": [ "jsonwebtoken" ] }
-
Excluding developmental or test dependencies
Red Hat Dependency Analytics does not analyze dependencies marked asdev
ortest
, these dependencies are ignored. For example, settingtest
in thescope
tag within apom.xml
file:<dependency> <groupId>...</groupId> <artifactId>...</artifactId> <version>...</version> <scope>test</scope> </dependency>
For example, setting
devDependencies
attributte in thepackage.json
file:{ "name": "sample", "version": "1.0.0", "description": "", "main": "index.js", "keywords": [], "author": "", "license": "ISC", "dependencies": { "dotenv": "^8.2.0", "express": "^4.17.1", "jsonwebtoken": "^8.5.1", "mongoose": "^5.9.18" }, "devDependencies": { "axios": "^0.19.0" } }
-
Red Hat Dependency Analytics report
The Red Hat Dependency Analytics report is a temporary HTML file that exist if the Red Hat Dependency Analytics Report tab remains open. Closing the tab removes the temporary HTML file. You can specify the file name by modifying the Red Hat Dependency Analytics: Red Hat Dependency Analytics Report File Path field in the extension settings.
You can automate the analysis of your application's vulnerabilities within the build and release pipeline. Red Hat offers integration with these Continuous Integration (CI) platforms:
The goal of this project is to significantly enhance a developer's experience by providing helpful vulnerability insights for their applications.
The Red Hat Dependency Analytics Extension for Visual Studio Code collects anonymous usage data and sends it to Red Hat servers to help improve our products and services.
Read our privacy statement to learn more.
This extension respects the redhat.telemetry.enabled
setting, which you can learn more about here.
There are two ways you can contact us:
- You can reach out to us at
[email protected]
with any questions, feedback, and general support. - You can also file a GitHub Issue.
Apache 2.0, See LICENSE for more information.