[QGIS-Developer] [security] Activate CodeQL Scanning in Github
Régis Haubourg
regis.haubourg at gmail.com
Wed Nov 13 03:30:39 PST 2024
Thanks a lot for you insights Even!
Ok then, this is way beyond my skills and available time, let's forget
this naive approach. And let's plant a seed. Any Grant proposal toward
enabling code scanning would be probably more than welcome.
I know some of you are trying to gather funding to approach the security
globally. If plans are already made, please express yourselves here. As
a person in charge of responding to security inquiries, I need some
visibility here.
Best regards
Régis
Le 13/11/2024 à 12:03, Even Rouault a écrit :
> Régis,
>
> you will probably need a bit more work than just pushing the default
> button, as it will likely generate a default codeql.yml file that
> won't work out-of-the-box on QGIS without tuning it. You'll need first
> to install the list of QGIS dependencies to get a successful build.
> Cf
> https://github.com/OSGeo/gdal/blob/master/.github/workflows/codeql.yml
> for an example on GDAL. We disabled Python scanning, as 99% of Python
> is in our test suite and I didn't want to be spammed about warnings in
> non-production code. Turned on a large code base like QGIS, be ready
> to see several hundreds of warnings popping up. In GDAL, one of the
> most recurring category was about "Multiplication result converted to
> larger type", ie doing something like int64_t var = some_int_32_var *
> another_int_32_var. Another thing I noticed with CodeQL is that it
> seems to limit the analysis to a max number of files, more or less
> randomly chosen depending on builds. So while we have it enabled for
> pull requests, in some cases, it missed new warnings specific on the
> PR during the review of the PR, but it then analyzed the modified
> files during a run in master. As QGIS is larger than GDAL, I would
> expect that to happen for QGIS too. That said, there's probably no
> harm in enabling it as the number or detail of warnings is only
> visible to users with write privileges to the repository
>
> Even
>
> Le 13/11/2024 à 09:58, Régis Haubourg via QGIS-Developer a écrit :
>>
>> Hi all,
>>
>> the security requirements of IT departments keeps on growing and we
>> receive more and more requests on the security mail.
>>
>> The topic is broad, from filling in custom forms based on various
>> national or company-specific policies, to very precise vulnerability
>> scanning, or even ask us what we do to prevent XZ-like social
>> engineering attacks.
>>
>> To get a better score on good practices [0], a simple first step
>> would be to activate code scanning. Github provides CodeQL [1] for
>> free. I would like to activate it and see how it goes.
>>
>> Would you be OK with activating this and see how it goes (too much
>> spamming, limitations on our codebase, more advanced configuration
>> required etc... ) ?
>>
>> In case of no reaction, I'll push the button on friday and see what
>> happens :)
>>
>>
>> @lova @Tim, we probably should do similar things for our websites, we
>> have some bounty seekers raising disclosures on our websites. I'd
>> prefer that we catch those CVE earlier than have to deal with some of
>> those anonymous persons.
>>
>>
>> Thanks a lot !
>>
>> Régis
>>
>>
>> [0] https://securityscorecards.dev/viewer/?uri=github.com/qgis/QGIS
>>
>> [1] https://codeql.github.com/
>>
>>
>> _______________________________________________
>> QGIS-Developer mailing list
>> QGIS-Developer at lists.osgeo.org
>> List info: https://lists.osgeo.org/mailman/listinfo/qgis-developer
>> Unsubscribe: https://lists.osgeo.org/mailman/listinfo/qgis-developer
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.osgeo.org/pipermail/qgis-developer/attachments/20241113/9a60a07f/attachment.htm>
More information about the QGIS-Developer
mailing list