Inspire and get inspiration from other Open Source Security journeys
Our Head of Research and Development, Emil, just dropped some knowledge nuggets on Open Source Health, and you won't want to miss it.We've got that video for you (thanks Fortify!), and it's packed with insights that could transform the way you approach health data. Enjoy!
Debricked CLI Migration guideTutorial
The Legacy CLI has now been officially deprecated and will soon stop working. Going forward, all our efforts and enhancements will be dedicated solely to the new Debricked CLI. Thus, we strongly recommend and encourage your transition to the new CLI in order to stay aligned with the latest features and improvements.Read on to find out why you should migrate to the new CLI and what actions are needed from your side. Why switch to the new CLI? The new Debricked CLI is distributed as a self-contained binary, removing the need for a PHP environment. This makes it easier to install, integrate, run, and upgrade. We have also added and will continue to add new functionalities and improvements, such as:Automatic application of git metadata to scans Faster scanning*: Finding and uploading files is now significantly faster Improved call graph generation for vulnerable functionality Manifest-less/fingerprint matching (upcoming) *In the new CLI, we have incorporated a cutting-edge technology: High
Hi! I got asked today how Debricked can handle “multiple services” in the same repo. It is common to have monorepos with different deployments/microservices/etc.. in them, but you want to logically separate them in the debricked UI. This is easy to do through the CLI, and I have an example repository here: https://github.com/emilwareus/debricked-split-repo This is how the base action looks, but I would probably just split this into two separate actions to get a better overview of what services triggers what rules, and potentially only run the scans on changes in each service. name: Debricked scanon: [push]jobs: vulnerabilities-scan: runs-on: ubuntu-latest steps: - uses: actions/checkout@v3 - name: Install Debricked CLI run: | curl -L https://github.com/debricked/cli/releases/latest/download/cli_linux_x86_64.tar.gz | tar -xz debricked ./debricked --version # Here I make two separate scans with debricked in different parts of the repo
Bringing new tools in and getting them to be adapted can be a herculean effort. Habits take work to change. We’ve put together a customizable email template that you can send out to your team so they are up to speed with Debricked. InstructionsCopy the template below and paste it into a new email/internal message. If you are using Notion for your internal documentation, you might want to duplicate this page. Customize the [placeholder text]. Add any additional context to help your team understand how and why you’re using Debricked, and remove any content irrelevant to your environment. Send the email/message to your team and prepare to get your open source security on point! Template Hello team,As some of you know, we’re now using Debricked as our Software Composition Analysis tool (SCA). Debricked will scan our repositories for any unwanted vulnerabilities and non-compliant licenses and support us in finding open source projects that fit our internal policies.Why are we using Debricke
Last week we hosted our monthly onboarding session: “Learn the Debricked Fundamentals”. In this webinar we usually go through an overview of the tool and some Q&A from the audience. No FOMO is needed.You can watch it here or share it with your team.You can join live next time 👇
Join us as we unravel the world of cybersecurity terminology. Are you sometimes lost in the whirlwind of cybersecurity terms? Want to learn more about its fundamentals and how you and your team can stay safe? Look no further! 🛡️ Check out my brand new YouTube playlist filled with informative videos on the basics of cybersecurity. From basic definitions to understanding common threats, these videos have you covered. 🎥 Watch the playlist here: https://www.youtube.com/playlist?list=PLZQ5U-W8XnxMrF2UKpkC03sG2OrEE5bkf Big thanks to @martin.hell for sharing his knowledge with us!
Whether it's the project's mission, community engagement, documentation, or something else entirely, we want to hear from you.Let's learn from each other and discover what makes open source projects truly remarkable! Share your insights below. ✨
Ahoy Portal members! It is Friday again and time to cache-up with the latest cool content you have found around open source and/or general tech. As always, I will start: this week I was super dazzled by Coca-Cola’s recent advertisement: 100% AI-Generated 🤯. See below (and here for the impressive behind the scenes): What has fascinated you this week? Share below ✨
Hi all, I have been using Debricked for my pet projects for a while now and have been liking it a lot. However, I also have a few custom Docker images which I wanted to scan using Debricked. While there doesn’t seem to any official Docker image support (yet?), I figured that I could try to generate a CycloneDX report using Docker’s SBOM plugin (https://github.com/docker/sbom-cli-plugin) and then import that. Said and done, I ran the plugin with flags --format cyclonedx-json --output imagename.sbom.json, the CLI automatically picked up the CycloneDX reports and after a few seconds I got both license and vulnerabilities back! TLDR: To scan Docker images with Debricked, you need to do the following: Install and run the Docker SBOM CLI plugin, https://github.com/docker/sbom-cli-plugin, in order to generate a CycloneDX report. Make sure to change the format to CycloneDX, e.g.:docker sbom username/imagename:latest --format cyclonedx-json --output imagename.sbom.json Run Debricked CLI, https:
One of the thing that personally fascinates me with open source is its ability to connect people to solve for some societal challenges and make scientific breakthroughs that can make our lives better. This week I enjoyed reading about how “Open source is fuelling the future of nuclear physics”. Interesting piece about making balanced choices on how much is too open as in this case it can be a double-edge sword. Is there anything you enjoyed reading/seeing/listening this week? Share with us below
There are many definitions, opinions and interpretations out there on what is considered a security threat. What does this mean to you and your team? Have you created an internal definition? We’d love to hear your thoughts about it.✨ We have shared our thoughts a while back - you can read it here.
Hello Portal crew, We are working on some changes to the current Overview page. Besides seeing your vulnerabilities overtime, you’ll also be able to check your fixed vulnerabilities and the combined license risks of all your repositories in one centralized place, cool huh? But the future of this page is not yet decided and we would love to hear from you what could make this page more useful. It could be anything from all time history data, recent comments, review statuses, action points, or something else entirely! You name it We’d love your input, please share it below. Thank you ✨Ida - Product designer
Last week we have shared the virtual stage up Fortify to unveil the Key Takeaways from the 2023 State of Code Security Report and we want to share the gold with you! Feel free to peek through the resources at your own pace. 🎥 You can access the recording of the session here📖 If you want to take a step further and deep dive into the resources you can check those shared by Fortify in this page and also this e-book that Martin refers to some times in the video (Managing and Fixing Open Source Vulnerabilities at scale) Enjoy!
Share your open source journey with us! Whether you're a veteran or just starting out, we'd love to know what motivated you to join the community. Tell us how open source has impacted your life and career in the comments below. Bonus points for sharing your tips on securing your open source code 😎.
Ahoy ship members,It’s time for another cache up of recent news on Open Source Security/Cybersecurity or general Open Source that you found insightful or interesting recently.I will start: this week I read how some hackers could mess up with Tesla’s infotainment system by exploiting three vulnerabilities. Thankfully those vulnerabilities did not enable, at least that is known of, the car navigating control. Wild, huh?What has recently inspired or surprised you? Share with u below 👇
If you are following us on YouTube, you might have noticed that we are on a streak of new videos. Have you checked our Product tutorials playlist? Today we want to highlight Open Source Select and Start Left tutorial. Learn how you can become risk-proactive rather than risk reactive with a few clicks. Let us know below what you think about the new tutorials and if you would like us to cover any special topic. ✨ Stay informed, stay secure!
Dear Portal crew, we value your input and would love to hear your ideas! What type of content would you like to see more of in our community? For example: videos, tutorials, AMAs (ask me anything) session, workshops, etc. Anything is valid.Share your ideas with us in the comments below. Have a great weekend! Here is a little bonus for opening this post and helping us out 😄 [Abhinav Pandey,Dev.to]
Can you also feel the spring in the air right now? Just like that, we are in the last days of “official” winter here in Europe. Besides the days getting longer and a glimpse of reinvigoration after the winter, tell us, what has inspired you recently in the Open Source (Security) or general tech?As you might imagine we have a “rush” for fixing vulnerabilities here at Debricked, so when I was reading the news this morning I thought I would do my share of spreading the word on a recently discovered vulnerability on some Android phones that might be affecting you. Check it out here. Have a great weekend!
We are using Debricked as a stage in our Azure Devops Pipeline. We have been forced to actually disable it’s capacity to fail the pipeline as it does that too much. What we really want is for it to fail if and only if A CVE is found of certain level AND there do exist a remedy for it that we can fix. Stopping on CVE that has no fix makes no sense, imho.
Check out our freshly brewed video tutorials helping you get the most out of Debricked’s Azure DevOps integration in our YouTube channel: How to add Debricked to your Azure DevOps pipeline Opening a Debricked generated Pull Request on Azure DevOps Shoutout to @emilwareus for creating these step by step tutorials. ✨ For more information about the integration, please check out our docs.Happy scanning!
Greetings, portal ship members 🚀 It’s story time!How are you harnessing the power of Debricked’s API to explore the vastness of the open source universe in your workflows?We would love to hear your tales of triumph and feature you on our Community homepage! Share your knowledge in the comments below.
And just like that, it’s Friday again 💥 So it is time to cache-up on the latest on Open Source (Security)/Cybersecurity or general in tech. What has inspired you recently? I will get started 👉 I am a bit of a weather forecast aficionada so I was instantly drawn to this blog post about creating your own Weather Forecast station at home with open source software.Nifty! In case you are like me and if you do not have plans this weekend, here is a challenge for you 😉. What has inspired this week? Share with us below.
Your weekly doses of inspiration is here ⚡️ This week I was inspired by reading this article about Ukraine’s Volunteer Cyber Army and the work they are doing to fight against the online war side of things with Russia. Including a 3 day long Hackathon. That got me thinking about the power of hackathons to solve-real live problems! Have you ever participated in one? Or would you like to? Which one? Comment in the thread below 👇
Create an account
You can create an account below using either single sign-on or a username/password. Already have an account? Log in
Log in with Debricked
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.