-
Notifications
You must be signed in to change notification settings - Fork 5
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
RustSec integration #7
Comments
An immediate integration that might make sense is integrating with our advisory linter to ensure the call graph information is valid, i.e. that the affected functions in the advisory actually exist in the enumerated release(s) |
I'd say this is basically the main and first thought beyond the tool! Right now, the big issue is finding a way we can serve queries against the database and pay for that. I see that as three paths that could really be independent.
You already mentioned option 1, basically, but I'd also like to bring up number 3 as something to discuss - as we are mainly wanting to think "What is the minimal subset of information I think it may also bring up the need for a more unified formation for |
You can view the information we already collect here, although at present it isn't validated: https://github.com/search?q=repo%3Arustsec%2Fadvisory-db%20functions&type=code It's effectively a UFCS path to the affected functions for a given advisory, where each function is also annotated with a set of SemVer selectors for which releases that function existed (allowing the function to be renamed between releases but still identified as vulnerable) |
alright, can we just close this issue. it's been almost a year and i don't think anyone cares about this issue |
I would still love to use information from |
Hello from @rustsec! 👋
We have a long standing issue (rustsec/rustsec#21) to use call graph analysis for false positive elimination.
Right now our advisories sometimes contain (unvalidated) information about functions affected by a given vulnerability we could use to "taint" a call graph. This would be particularly useful for transitive dependencies where we can say none of the immediate dependencies ever call an affected function in any of the transitive dependencies.
My immediate question would be what would be the best way to store/query this information so it could be consumed by a tool like
cargo-audit
? Could the database be made online somehow, either as a service or some sort of flat file format broken down by crates and versions?The text was updated successfully, but these errors were encountered: