Search before asking
Motivation
When people/companies evaluate open source software to rely and build on
they more and more
do not only look on its functional value alone
but also on topics like
- trust giving name/membership (e.g. part of Apache family)
- existing community size and growth
- development progress and
- especially security.
One thing often done, is a quick automated analysis
- of used dependencies
- their updated state
- number of contained unfixed CVEs (total)
- risk of these CVEs
- number of contained CVEs with available fix (unfixed)
This quick analysis gives a first taste/impression
on two things:
- the potential of having a meaningful security problem when using the software
- the awareness of the community for the topic security
Often you do not even have to do the analysis on your own,
but you can directly find analysis results using web search.
When doing this for pulsar,
you easily find e.g. on artifacthub.io
an analysis of the latest official helm chart for Apache Pulsar
https://github.com/apache/pulsar-helm-chart
the summarized result of security analysis shows:
992 vulnerabilities (623 fixable) have been detected in this package's
images.
In detail:
- there are dependencies with well known security issues (with official CVE numbers)
- there is a pretty huge number of known and documented vulnerabilities: 992
- including important ones (critical, high rating)
- not only in the accompanying software in helm (prometheus, grafana) but in core directly (pulsar)
- some were known for 9 years (CVE numbers from 2013)
- there are possible fixes for most of them (for 623)
see source https://artifacthub.io/packages/helm/apache/pulsar?modal=security-report
Of course, this is only a first rough impression given by this analysis.
And the chart does not contain the very latest version of pulsar (even so, it's the latetst official helm chart)
When looking into every detail of the reported numbers, you can of course argue why not every counted vulnerabilities is a disaster...
=> But how can you easily argue to anyone having seen this fast result
In general, this software (pulsar) is secure, you can use it without any concerns.
?
Solution
- finding/giving some good arguments e.g. in doc
or
- if this is really not possible today,
a way/plan to find a solution to make it possible to say in the near future:
Pulsar is secure, you can use it without any concerns.
Alternatives
No response
Anything else?
No response
Are you willing to submit a PR?
Search before asking
Motivation
When people/companies evaluate open source software to rely and build on
they more and more
do not only look on its functional value alone
but also on topics like
One thing often done, is a quick automated analysis
This quick analysis gives a first taste/impression
on two things:
Often you do not even have to do the analysis on your own,
but you can directly find analysis results using web search.
When doing this for pulsar,
you easily find e.g. on artifacthub.io
an analysis of the latest official helm chart for Apache Pulsar
https://github.com/apache/pulsar-helm-chart
the summarized result of security analysis shows:
In detail:
see source https://artifacthub.io/packages/helm/apache/pulsar?modal=security-report
Of course, this is only a first rough impression given by this analysis.
And the chart does not contain the very latest version of pulsar (even so, it's the latetst official helm chart)
When looking into every detail of the reported numbers, you can of course argue why not every counted vulnerabilities is a disaster...
=> But how can you easily argue to anyone having seen this fast result
Solution
or
a way/plan to find a solution to make it possible to say in the near future:
Alternatives
No response
Anything else?
No response
Are you willing to submit a PR?