Show & Tell
Share your hacks & best practices with your peers
- 14 Topics
- 5 Replies
Debricked CLI Migration guideTutorial
The Legacy CLI has now been officially deprecated and will soon stop working. Going forward, all our efforts and enhancements will be dedicated solely to the new Debricked CLI. Thus, we strongly recommend and encourage your transition to the new CLI in order to stay aligned with the latest features and improvements.Read on to find out why you should migrate to the new CLI and what actions are needed from your side. Why switch to the new CLI? The new Debricked CLI is distributed as a self-contained binary, removing the need for a PHP environment. This makes it easier to install, integrate, run, and upgrade. We have also added and will continue to add new functionalities and improvements, such as:Automatic application of git metadata to scans Faster scanning*: Finding and uploading files is now significantly faster Improved call graph generation for vulnerable functionality Manifest-less/fingerprint matching (upcoming) *In the new CLI, we have incorporated a cutting-edge technology: High
Our Head of Research and Development, Emil, just dropped some knowledge nuggets on Open Source Health, and you won't want to miss it.We've got that video for you (thanks Fortify!), and it's packed with insights that could transform the way you approach health data. Enjoy!
Hi! I got asked today how Debricked can handle “multiple services” in the same repo. It is common to have monorepos with different deployments/microservices/etc.. in them, but you want to logically separate them in the debricked UI. This is easy to do through the CLI, and I have an example repository here: https://github.com/emilwareus/debricked-split-repo This is how the base action looks, but I would probably just split this into two separate actions to get a better overview of what services triggers what rules, and potentially only run the scans on changes in each service. name: Debricked scanon: [push]jobs: vulnerabilities-scan: runs-on: ubuntu-latest steps: - uses: actions/checkout@v3 - name: Install Debricked CLI run: | curl -L https://github.com/debricked/cli/releases/latest/download/cli_linux_x86_64.tar.gz | tar -xz debricked ./debricked --version # Here I make two separate scans with debricked in different parts of the repo
Bringing new tools in and getting them to be adapted can be a herculean effort. Habits take work to change. We’ve put together a customizable email template that you can send out to your team so they are up to speed with Debricked. InstructionsCopy the template below and paste it into a new email/internal message. If you are using Notion for your internal documentation, you might want to duplicate this page. Customize the [placeholder text]. Add any additional context to help your team understand how and why you’re using Debricked, and remove any content irrelevant to your environment. Send the email/message to your team and prepare to get your open source security on point! Template Hello team,As some of you know, we’re now using Debricked as our Software Composition Analysis tool (SCA). Debricked will scan our repositories for any unwanted vulnerabilities and non-compliant licenses and support us in finding open source projects that fit our internal policies.Why are we using Debricke
Last week we hosted our monthly onboarding session: “Learn the Debricked Fundamentals”. In this webinar we usually go through an overview of the tool and some Q&A from the audience. No FOMO is needed.You can watch it here or share it with your team.You can join live next time 👇
Join us as we unravel the world of cybersecurity terminology. Are you sometimes lost in the whirlwind of cybersecurity terms? Want to learn more about its fundamentals and how you and your team can stay safe? Look no further! 🛡️ Check out my brand new YouTube playlist filled with informative videos on the basics of cybersecurity. From basic definitions to understanding common threats, these videos have you covered. 🎥 Watch the playlist here: https://www.youtube.com/playlist?list=PLZQ5U-W8XnxMrF2UKpkC03sG2OrEE5bkf Big thanks to @martin.hell for sharing his knowledge with us!
Hi all, I have been using Debricked for my pet projects for a while now and have been liking it a lot. However, I also have a few custom Docker images which I wanted to scan using Debricked. While there doesn’t seem to any official Docker image support (yet?), I figured that I could try to generate a CycloneDX report using Docker’s SBOM plugin (https://github.com/docker/sbom-cli-plugin) and then import that. Said and done, I ran the plugin with flags --format cyclonedx-json --output imagename.sbom.json, the CLI automatically picked up the CycloneDX reports and after a few seconds I got both license and vulnerabilities back! TLDR: To scan Docker images with Debricked, you need to do the following: Install and run the Docker SBOM CLI plugin, https://github.com/docker/sbom-cli-plugin, in order to generate a CycloneDX report. Make sure to change the format to CycloneDX, e.g.:docker sbom username/imagename:latest --format cyclonedx-json --output imagename.sbom.json Run Debricked CLI, https:
Last week we have shared the virtual stage up Fortify to unveil the Key Takeaways from the 2023 State of Code Security Report and we want to share the gold with you! Feel free to peek through the resources at your own pace. 🎥 You can access the recording of the session here📖 If you want to take a step further and deep dive into the resources you can check those shared by Fortify in this page and also this e-book that Martin refers to some times in the video (Managing and Fixing Open Source Vulnerabilities at scale) Enjoy!
Share your open source journey with us! Whether you're a veteran or just starting out, we'd love to know what motivated you to join the community. Tell us how open source has impacted your life and career in the comments below. Bonus points for sharing your tips on securing your open source code 😎.
If you are following us on YouTube, you might have noticed that we are on a streak of new videos. Have you checked our Product tutorials playlist? Today we want to highlight Open Source Select and Start Left tutorial. Learn how you can become risk-proactive rather than risk reactive with a few clicks. Let us know below what you think about the new tutorials and if you would like us to cover any special topic. ✨ Stay informed, stay secure!
Check out our freshly brewed video tutorials helping you get the most out of Debricked’s Azure DevOps integration in our YouTube channel: How to add Debricked to your Azure DevOps pipeline Opening a Debricked generated Pull Request on Azure DevOps Shoutout to @emilwareus for creating these step by step tutorials. ✨ For more information about the integration, please check out our docs.Happy scanning!
Greetings, portal ship members 🚀 It’s story time!How are you harnessing the power of Debricked’s API to explore the vastness of the open source universe in your workflows?We would love to hear your tales of triumph and feature you on our Community homepage! Share your knowledge in the comments below.
Yesterday we have unveiled the secrets of SBOM: The Key to Secure Software Supply Chain Management in an insightful live session. No FOMO is needed, we are here to share the knowledge with you! 🎥 You can access the recording of the session here.📖 If you want to take a step further and deep dive into the topic, you can check our new blog post series about SBOM here. Enjoy and we hope to see you live soon!
Debricked supports SBOM scanning of CycloneDX sboms. I really wanted to scan my Conan project, so I created a GitHub Action that generates an SBOM and scans it with the Debricked tool.Here is the action: https://github.com/emil-debricked/examples/blob/master/.github/workflows/debricked.yml It uses the official CycloneDX Conan generator from the CycloneDX project :) https://github.com/CycloneDX/cyclonedx-conan Hope you like it!
Create an account
You can create an account below using either single sign-on or a username/password. Already have an account? Log in
Log in with Debricked
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.