Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ossf/wg-security-tooling
OpenSSF Security Tooling Working Group
https://github.com/ossf/wg-security-tooling
Last synced: about 1 month ago
JSON representation
OpenSSF Security Tooling Working Group
- Host: GitHub
- URL: https://github.com/ossf/wg-security-tooling
- Owner: ossf
- License: apache-2.0
- Created: 2020-07-21T00:11:13.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2024-05-17T00:59:02.000Z (7 months ago)
- Last Synced: 2024-08-05T17:30:21.578Z (4 months ago)
- Homepage: https://openssf.org
- Size: 127 KB
- Stars: 295
- Watchers: 67
- Forks: 52
- Open Issues: 16
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Security: SECURITY.md
Awesome Lists containing this project
- awesome-hacking-lists - ossf/wg-security-tooling - OpenSSF Security Tooling Working Group (Others)
README
# OSSF Security Tooling
Anyone is welcome to join our open discussions related to the group's mission and charter.
## Motivation
Most developers are not security experts and even the most seasoned developers, security experts or not, make mistakes. Tools can be used to help weed out security defects allowing developers to focus on the features they want to develop.
## Objective
Our mission is to Identify, Evaluate, Improve, Develop & Ease Deployment of universally-accessible, developer focused tooling to help the open source community secure their code. This space allows members to collaborate together on these goals.
* Identify - There are a large number of tools that developers can utilize in various development environments. We need to ensure we understand the options available.
* Evaluate - Some tools are better than others. We need to ensure quality tools are available to the open source community.
* Improve - Some tools need just a little bit of help to offer the best solution. We need to, where possible, contribute to improve those tools.
* Develop - Despite the large number of tools available, there are still large areas of the security problem space that do not have tools to help developers find issues. We will develop those tools where there is interest and bandwidth.
* Ease Deployment - __Most critically__, open source developers need to know what tools they should be using and how to easily integrate them into their development process. Unless developers have an easy way to drop in security tooling, it is unlikely to be included. We will provide this information to open source developers.## Vision
Our vision is to improve the perception of security in open source software.
## Governance
The [CHARTER.md](CHARTER.md) outlines the scope and governance of our group activities.
This group is chaired by [Ryan Ware](https://github.com/ware).
## Get Involved
* [Current Meeting Minutes](https://docs.google.com/document/d/1bFpHEbbEUf2rWiYXQY7cGg1HrmI9TqwaD8U_3Hi9A8I/edit#heading=h.wdz394z3k3h2)
* [Previous Meeting Minutes](https://docs.google.com/document/d/1jzxhzIfkOMTagpeFWYoZpMKwHYeO4Gc7Eq5FcMFEw2c/edit?usp=sharing)
* [Mailing list](https://lists.openssf.org/g/openssf-wg-security-tooling). [Manage your subscriptions to Open SSF mailing lists](https://lists.openssf.org/g/main/subgroups).
* [Slack](https://openssf.slack.com/archives/C019Q1VEA87)## Meeting Times
[Zoom](https://zoom-lfx.platform.linuxfoundation.org/meeting/94897563315?password=7f03d8e7-7bc9-454e-95bd-6e1e09cb3b0b) every other Friday at 16:00 GMT from Nov 17.
The meeting invite is available on the public [OSSF calendar](https://calendar.google.com/calendar?cid=czYzdm9lZmhwNWk5cGZsdGI1cTY3bmdwZXNAZ3JvdXAuY2FsZW5kYXIuZ29vZ2xlLmNvbQ).
## Meeting Notes
Meeting notes are maintained in a [Google Doc](https://docs.google.com/document/d/1bFpHEbbEUf2rWiYXQY7cGg1HrmI9TqwaD8U_3Hi9A8I/edit). If attending please add your name, and if a returning attendee, please change the color of your name from gray to black.
## Antitrust Policy Notice
## Special Interest Groups (SIGs) and Projects
### SBOM Everywhere SIG
* **Mission**: Improve Software Bill-of-Materials (SBOMs) tooling, training and adoption for the open software ecosystem.
* **Meeting Times**: Monthly on the first Tuesday @10:30am Pacific Time starting January 15, 2023
* **Where**: https://zoom.us/j/96699865335?pwd=QlFiNjU0OTdrOTE1KzBQcDV0Q1RHZz09 (overlaps WG call time)
* **Meeting notes**: https://docs.google.com/document/d/1LS5PxWP4-dycCLCaZjf_DZtG-XJy2PUoq5jJQvDMQa8/edit
* **Mailing list**: https://lists.openssf.org/g/openssf-sig-sbom### OSS Fuzzing SIG
* **Mission**: Improve open source code fuzzing via open source tooling
* **Meeting Times**: Every 2 weeks on Tuesday @8:00am Pacific Time
* **Where**: https://zoom.us/j/99960722134?pwd=ZzZqdzY1eG9tMzQxWFI1Z0RhTkUxZz09
* **Meeting notes**: https://docs.google.com/document/d/1u4_vL0UK69C7D3qatP9Q6gjGX1PMJjWnO4-3F4pJ0oo/edit#
* **Mailing list**: https://groups.google.com/g/fuzzing-collaboration
* **Related work** (non-OpenSSF):
* [OSS-Fuzz: Continuous fuzzing for open source software](https://github.com/google/oss-fuzz)
* [FuzzBench: Fuzzer Benchmarking As a Service](https://github.com/google/fuzzbench)
* [Fuzz-introspector](https://github.com/ossf/fuzz-introspector/) - a tool to help fuzzer developers to get an understanding of their fuzzer’s performance and identify any potential blockers.---
### Past SIGs
#### Guide to Security Tools SIG
* [Guide to Security Tools](https://github.com/ossf/wg-security-tooling/blob/main/guide.md)
#### False Positive Suppression Specification SIG
* [(DRAFT) False Positive Suppression Specification](https://docs.google.com/document/d/1811qanC8h9egv3Iszn_rrXGtAoSCz0YJGzp9vACjjH8/edit#)
#### CVE Benchmark SIG
* The [CVE benchmarking initiative](https://github.com/ossf-cve-benchmark/ossf-cve-benchmark) was announced at [BlackHat Europe 2020](https://www.blackhat.com/eu-20/briefings/schedule/#fps-are-cheap-show-me-the-cves-21345), presented by [Bas van Schaik](https://github.com/sj) and [Kevin Backhouse](https://github.com/kevinbackhouse).
### OSS Fuzzing
* Fuzzing Collaboration subgroup - focuses on improving fuzzing
- Meets montly starting 2022-01-04 at 10:30am Pacific Time (see the OpenSSF calendar) via [this Zoom link](https://zoom.us/j/99960722134?)
- [Meeting notes](https://docs.google.com/document/d/1TmhqYpB1Ly-5o-F31RVHxgpunW6qeDTVopBCtCmKhs0/edit?usp=sharing)
- Has its own [fuzzing-collaboration mailing list on Google Groups](https://groups.google.com/g/fuzzing-collaboration)
* [Fuzz-introspector](https://github.com/ossf/fuzz-introspector/) - a tool to help fuzzer developers to get an understanding of their fuzzer’s performance and identify any potential blockers.* [Web Application Definition 1.0.0](https://github.com/ossf/wg-security-tooling/wiki/WebAppDefn)
---
## Antitrust policy
Linux Foundation meetings involve participation by industry competitors, and it is the intention of the Linux Foundation to conduct all of its activities in accordance with applicable antitrust and competition laws. It is therefore extremely important that attendees adhere to meeting agendas, and be aware of, and not participate in, any activities that are prohibited under applicable US state, federal or foreign antitrust and competition laws.
Examples of types of actions that are prohibited at Linux Foundation meetings and in connection with Linux Foundation activities are described in the Linux Foundation Antitrust Policy available at . If you have questions about these matters, please contact your company counsel, or if you are a member of the Linux Foundation, feel free to contact Andrew Updegrove of the firm of Gesmer Updegrove LLP, which provides legal counsel to the Linux Foundation.