当前位置:网站首页>2021 software security report: open source code, happiness and disaster depend on each other?
2021 software security report: open source code, happiness and disaster depend on each other?
2022-07-02 20:33:00 【Tengyuanhui】
In the near future , A report from a safety testing company shows , The application security situation in the open source field has improved as a whole , But there are still problems , Vulnerabilities including open source code are exploited , And the risks of the third-party code base itself .
The above findings come from Veracode released 《 Software security report ( The first 12 edition )》, The millions of different types of data used in the report come from Veracode Server and client of , And static analysis of these data 、 dynamic analysis 、 Software composition analysis and penetration testing .
PART ONE
Open source code has fewer defects , Faster vulnerability repair
According to the report :「 Open source libraries are still a worrying security factor 」, This is a long-standing , And the hidden danger that continues to this day , The reason lies in the bad habits of developers .
A large number of developers use the same code base year after year , Facts and experience have proved , This will cause us to encounter the same security vulnerabilities year after year
For all that , The report still believes , Third party open source code libraries have many advantages , There are fewer defects , And the problem can be solved faster :
The good news is , Security vulnerabilities caused by third-party code , There is a significant improvement in the timeliness of repair . stay 2017 year , A security vulnerability has never been found , To 50 % The repair point where the defect is solved , It will take more than three years , Now it only takes about a year .
besides , The report also studies the repair process of security vulnerabilities , And the future of security application is prospected :「 On the whole , The application security situation has improved , The impact scope of the vulnerability is also declining .」
meanwhile ,Veracode Also pointed out , The closer the connection between the codes , And the rise of distributed microservices , Makes application security more complex :
「 The reason for this is , In addition to the closer relationship between the codes , There is also the impact of intensified competition and continuous innovation 」. In order to speed up the progress , Many development teams turn to cloud native technology 、 Microservice architecture and open source code to optimize their workflow .
Besides , More and more development teams are adopting agile development , And use automation as much as possible in the development process .
Although this evolution has shortened the software development life cycle , But it also brings new complexities and risks .
PART TWO
More and more people use security scanning
In the report , There are some data worthy of our attention :
- Microservices : stay 2018 year , There are about 20% The application of includes many languages . Now , Only less than 5% Our application uses many languages , More are small 、 Monolingual applications or microservices .
- The number of applications using security scanning has tripled : The average quarterly scan is more than 17 A new application , This figure is more than three times that of ten years .
- More organizations use multiple types of security scanning : stay 2018 to 2021 During the year , The number of users using multiple scanning types has increased 31%, Most of this growth comes from the use of a full set of static 、 Dynamic and SCA Scanned organization .
- Most developers insist on using the same code base year after year : Developers insist on using proven libraries , Rarely willing to try to choose 「 Coolest 」 or 「 The most popular 」 To refactor their code base .
PART THREE
agile development 「 Devour 」 The world
Data based ,Veracode Draw four conclusions :
- small 、 Modular agile development has 「 Devour 」 The world . The number of applications using security scanning has exploded ; Developers have changed from scanning their applications once a quarter to once a day , And use more different scanning techniques .
- Free and open source code will continue to be a blessing and a hidden danger for developers . The use trend of third-party code base has not changed significantly , Code bases with obvious defects are less used , This is very positive .
- The application is slowly developing towards a safer direction . This is the most exciting part of the whole analysis . Although over time , The prevalence of some security vulnerabilities has increased , But the trend is generally downward . Because the ability and speed of vulnerability repair are not necessarily increased , So I hope this trend can continue , The future will also remain bright .
- The emergence of new scanning tools will continue to improve the application security environment . Using different types of security scanning means that developers will be faster 、 Repair all types of defects more completely . These different types of scanning tools are built into the integrated pipeline and IDE in , It will speed up the use of developers .
PART FOUR
Small junction
At the end of the report ,Veracode In conclusion :
Security holes are like bills , Accumulated over time , Settle as soon as possible , It can reduce the workload in the future . Use many types of security scanning —— static state 、 Dynamic or software combination analysis , You can have a more comprehensive understanding of application security , And help speed up 、 Solve security problems more thoroughly .■
English links :App Security Report: Open Source Code Still 'Blessing and a Curse' -- Virtualization Review
Backstage reply key words 「 Software security report 」, You can download the full version of the report PDF.
Tengyuan club is a convergence open source project established by Tencent cloud 、 Open source enthusiasts 、 The open community of open source leaders , Committed to helping open source projects grow healthily 、 Open source enthusiasts can communicate and assist 、 Open source leaders can play leadership value , Make the global open source ecosystem more prosperous .
Welcome to your attention 「 Tengyuan Club 」 official account , Looking forward to your 「 Looking at 」 Oh ~
边栏推荐
- 攻防世界pwn题:Recho
- The first of the classic quotations of correspondents is heartbreaking
- Esp32c3 crash analysis
- 自动化制作视频
- [real case] trap of program design - beware of large data
- Istio deployment: quickly start microservices,
- Friends who firmly believe that human memory is stored in macromolecular substances, please take a look
- [JS] get the search parameters of URL in hash mode
- Research Report on the overall scale, major manufacturers, major regions, products and application segmentation of shock absorber oil in the global market in 2022
- At compilation environment setup -win
猜你喜欢
测试人员如何做不漏测?这7点就够了
[QT] QPushButton creation
Implementing yolox from scratch: dataset class
[871. Minimum refueling times]
Data preparation for behavior scorecard modeling
Highly qualified SQL writing: compare lines. Don't ask why. Asking is highly qualified..
In depth understanding of modern web browsers (I)
SBT tutorial
Solution to blue screen after installing TIA botu V17 in notebook
Friends who firmly believe that human memory is stored in macromolecular substances, please take a look
随机推荐
Function, function, efficiency, function, utility, efficacy
Is it safe to open an account for online stock speculation? I'm a novice, please guide me
八年测开经验,面试28K公司后,吐血整理出高频面试题和答案
Postman interface test practice, these five questions you must know
[cloud native topic -49]:kubesphere cloud Governance - operation - step by step deployment of microservice based business applications - basic processes and steps
Research Report on the overall scale, major manufacturers, major regions, products and applications of capacitive voltage transformers in the global market in 2022
Resunet tensorrt8.2 speed and video memory record table on Jetson Xavier NX (continuously supplemented later)
Development skills of rxjs observable custom operator
Attack and defense world PWN question: Echo
Jetson XAVIER NX上ResUnet-TensorRT8.2速度與顯存記錄錶(後續不斷補充)
c语言链表--待补充
【Hot100】22. bracket-generating
Detailed upgrade process of AWS eks
【每日一题】241. 为运算表达式设计优先级
Exemple complet d'enregistrement du modèle pytoch + enregistrement du modèle pytoch seuls les paramètres d'entraînement sont - ils enregistrés? Oui (+ Solution)
Research Report on the overall scale, major manufacturers, major regions, products and applications of sliding door dampers in the global market in 2022
for(auto a : b)和for(auto &a : b)用法
API文档工具knife4j使用详解
功能、作用、效能、功用、效用、功效
After 65 days of closure and control of the epidemic, my home office experience sharing | community essay solicitation