-
Notifications
You must be signed in to change notification settings - Fork 190
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs(blog): 2024 Year in Review blog post #2932
Open
andrewpollock
wants to merge
14
commits into
google:master
Choose a base branch
from
andrewpollock:blog_2024_review
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Changes from 2 commits
Commits
Show all changes
14 commits
Select commit
Hold shift + click to select a range
29b4cc2
docs(blog): 2024 Year in Review blog post
andrewpollock d606735
Merge branch 'master' into blog_2024_review
andrewpollock 3d1c5a5
fix: aggregate Maven OSV-Scanner changes
andrewpollock cc87b0a
fix: link to SUSE Schema PR
andrewpollock 19b59b6
Merge branch 'master' into blog_2024_review
andrewpollock e1ef1c6
feat: add metrics for 2024 CVE conversion
andrewpollock 6051066
feat: mention ingestion improvements
andrewpollock d6af6c4
feat: add GitHub Action adoption metric
andrewpollock 6e10a90
Merge branch 'master' into blog_2024_review
andrewpollock 39774d8
fix: expand on API usage
andrewpollock e1953e9
Merge branch 'master' into blog_2024_review
andrewpollock 240cb3d
feat: add cloud blog
andrewpollock 8cc3506
Update date
oliverchang fe1da8c
Add more details of things to come
oliverchang File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,98 @@ | ||
--- | ||
title: "The Year in Review" | ||
date: 2024-12-13T04:00:00Z | ||
draft: false | ||
author: The OSV Team | ||
--- | ||
2024 has been an *even more* eventful year for OSV. | ||
|
||
<!--more--> | ||
|
||
## New ecosystems support | ||
|
||
[OSV Schema](https://github.com/ossf/osv-schema) adoption momentum continued, with 2024 being the year of the Linux distributions with four adopting the schema, and now included in our [OSV.dev](https://osv.dev/list) database: | ||
|
||
* [Ubuntu](https://openssf.org/blog/2024/06/11/ubuntu-security-notices-now-available-in-osv/) | ||
* [Chainguard](https://openssf.org/blog/2024/07/03/chainguard-enhances-security-with-osv-advisory-feed/) | ||
* [Red Hat](https://openssf.org/blog/2024/11/01/red-hats-collaboration-with-the-openssf-and-osv-dev-yields-results-red-hat-security-data-now-available-in-the-osv-format/) | ||
* SUSE/openSUSE | ||
andrewpollock marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
We also expanded our existing coverage of Debian GNU/Linux, by [including CVE data from their Security Tracker](https://osv.dev/blog/posts/supporting-debian-security-tracker-data/) in our existing CVE record conversion. | ||
|
||
Additionally, the [curl project](https://curl.se/) [started contributing vulnerability records](https://osv.dev/blog/posts/announcing-curl-via-rest/). | ||
|
||
This has brought the total number of supported ecosystems to 30. The significantly increased coverage of Linux distributions has been very encouraging, and will enable a comprehensive container image scanning story in 2025. | ||
|
||
### Impact of the NVD's analysis challenges on Git commit range coverage | ||
|
||
Last year, we [announced](https://osv.dev/blog/posts/introducing-broad-c-c++-support/) the expansion of coverage of C/C++ software with Git range coverage of CVEs | ||
andrewpollock marked this conversation as resolved.
Show resolved
Hide resolved
|
||
programmatically converted from the NVD. The [reduction of the NVD's analysis capabilities](https://www.scworld.com/news/update-delays-to-nist-vulnerability-database-alarms-researchers) has had a broad impact on vulnerability management, and it has also impacted the effectiveness and comprehensiveness of this CVE conversion. On the expectation that this may persist into 2025, and in light of [related](https://github.com/cisagov/vulnrichment) [developments](https://www.cisa.gov/securebydesign/pledge) this year, we will be exploring additionally converting CVEs directly from the [CVE List](https://github.com/CVEProject/cvelist). | ||
|
||
## Data Quality | ||
|
||
We announced our [approach to data quality](https://osv.dev/blog/posts/announcing-data-quality-initiatives/), publishing a definition of the [Properties of a High Quality OSV Record](https://google.github.io/osv.dev/data_quality.html), and work on [this project](https://github.com/orgs/google/projects/62) is ongoing into 2025. | ||
|
||
## Infrastructure | ||
|
||
We added [support for importing records published at a REST API endpoint](https://osv.dev/blog/posts/announcing-curl-via-rest/), (with the [curl project](https://curl.se/) being the pilot home database to do so). | ||
|
||
A very impactful change to the OSV.dev [API](https://google.github.io/osv.dev/api/) has been the [ability to perform queries on existing and future data that OSV.dev did not have version enumeration support for](https://osv.dev/blog/posts/announcing-api-queries-for-more-linux-distros/). This unlocked the usage of existing data for vulnerability discovery via the API, and reduces the effort required to onboard additional ecosystems into the future. | ||
|
||
We also continued to make performance and reliability improvements to the API, and transitioned the website serving infrastructure from Google App Engine to Cloud Run. | ||
|
||
OSV.dev API usage of peaked at over 900 QPS in October. | ||
andrewpollock marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
With the growth in ecosystems, we took the opportunity to [simplify the exported data](https://groups.google.com/g/osv-discuss/c/V7ZSZEMewGA) in our public GCS bucket. | ||
|
||
## Community | ||
|
||
### Code | ||
|
||
![Image shows the GitHub star history for all OSV-related GitHub repositories taken at November 27, 2024. osv-schema has approximately 180 stars, osv.dev has approximately 1,500 stars, osv-scanner has approximately 6,270 stars, and osv-scanner-action has 16 stars.](star-history-20241127.png "GitHub star history for all OSV repos, as of 2024/11/27") | ||
andrewpollock marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
Interest and external contributions continue: | ||
|
||
* OSV Schema | ||
* [18 total contributors](https://github.com/ossf/osv-schema/graphs/contributors?from=2024-01-01&to=2024-12-31&type=c) | ||
* OSV.dev | ||
* [28 total contributors](https://github.com/google/osv.dev/graphs/contributors?from=2024-01-01&to=2024-12-31&type=c) | ||
* OSV-Scanner | ||
* [32 total contributors](https://github.com/google/osv-scanner/graphs/contributors?from=2024-01-01&to=2024-12-31&type=c) | ||
* OSV-Scanner GitHub Action | ||
* [8 total contributors](https://github.com/google/osv-scanner-action/graphs/contributors?from=2024-01-01&to=2024-12-31&type=c) | ||
andrewpollock marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
||
### Conferences and events | ||
|
||
We gave OSV-related presentations at: | ||
|
||
* [The inaugural VulnCon](https://www.first.org/conference/vulncon2024/program#pThe-Trials-and-Tribulations-of-Bulk-Converting-CVEs-to-OSV) in Raleigh, North Carolina, USA in February | ||
* [The SOSS Community Day](https://sosscdna24.sched.com/event/1aNLy/beyond-just-update-all-the-things-uncovering-the-nuances-of-dependency-security-rex-pan-holly-gong-google) in Seattle, Washington, USA in April | ||
* [The Open Source Summit, Japan](https://ossaidevjapan24.sched.com/event/1jKDY/trials-and-tribulations-of-updating-dependencies-for-vulnerability-remediation-xueqin-cui-michael-kedar-google) in Tokyo, Japan in October | ||
|
||
## Tooling | ||
|
||
### OSV-Scanner | ||
|
||
This year, OSV-Scanner gained these noteworthy new features: | ||
|
||
* [Guided Remediation](https://osv.dev/blog/posts/announcing-guided-remediation-in-osv-scanner/) for npm | ||
* [Transitive dependency scanning for Maven](https://osv.dev/blog/posts/announcing-transitive-dependency-support-for-maven-pomxml-in-osv-scanner/) | ||
* The ability to override findings in specific packages | ||
* Support for private Maven registries | ||
andrewpollock marked this conversation as resolved.
Show resolved
Hide resolved
|
||
* Additional support for scanning | ||
* NuGet version 2 lock files | ||
* pdm lockfiles | ||
* PNPM v9 lockfiles | ||
* gradle/verification-metadata.xml | ||
* CycloneDX 1.4 and 1.5 | ||
|
||
### A linter for OSV records | ||
|
||
As part of the our data quality program, work commencing on an [OSV record linting tool](https://github.com/ossf/osv-schema/tree/main/tools/osv-linter), which will carry on into 2025. | ||
|
||
## More to come in 2025 | ||
|
||
The team is looking forward to much more to come in 2025 and the OSV Schema and OSV.dev’s fourth birthday in February, and OSV-Scanner’s second birthday in December. | ||
|
||
We have a lot more exciting work planned in 2025, that we’ll share more details soon. Our main priorities for 2025 continue to be centered around improving data | ||
quality and providing accurate and actionable results that lead to easy remediation. |
Binary file added
BIN
+177 KB
gcp/website/blog/content/posts/2024-in-review/star-history-20241127.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Oops, something went wrong.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
we should also add https://security.googleblog.com/2024/12/google-cloud-expands-vulnerability.html somewhere now that it's published.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I've added a new "Integrations" section under "Community" and linked to this blog post. Ideally we'd have some other noteworthy call outs in here...