Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

It is SUGGESTED that at least one dynamic analysis tool be applied to any proposed major production release of the software before its release. #125014

Closed
godofredoc opened this issue Apr 18, 2023 · 5 comments
Assignees
Labels
Bot is counting down the days until it unassigns the issue infra: security Security-related infra issues

Comments

@godofredoc
Copy link
Contributor

godofredoc commented Apr 18, 2023

[dynamic_analysis] A dynamic analysis tool examines the software by executing it with specific inputs. For example, the project MAY use a fuzzing tool (e.g., American Fuzzy Lop) or a web application scanner (e.g., OWASP ZAP or w3af). In some cases the OSS-Fuzz project may be willing to apply fuzz testing to your project. For purposes of this criterion the dynamic analysis tool needs to vary the inputs in some way to look for various kinds of problems or be an automated test suite with at least 80% branch coverage. The Wikipedia page on dynamic analysis and the OWASP page on fuzzing identify some dynamic analysis tools. The analysis tool(s) MAY be focused on looking for security vulnerabilities, but this is not required.

@godofredoc godofredoc changed the title It is SUGGESTED that at least one dynamic analysis tool be applied to any proposed major production release of the software before its release. [dynamic_analysis] A dynamic analysis tool examines the software by executing it with specific inputs. For example, the project MAY use a fuzzing tool (e.g., American Fuzzy Lop) or a web application scanner (e.g., OWASP ZAP or w3af). In some cases the OSS-Fuzz project may be willing to apply fuzz testing to your project. For purposes of this criterion the dynamic analysis tool needs to vary the inputs in some way to look for various kinds of problems or be an automated test suite with at least 80% branch coverage. The Wikipedia page on dynamic analysis and the OWASP page on fuzzing identify some dynamic analysis tools. The analysis tool(s) MAY be focused on looking for security vulnerabilities, but this is not required. It is SUGGESTED that at least one dynamic analysis tool be applied to any proposed major production release of the software before its release. Apr 18, 2023
@godofredoc godofredoc self-assigned this Apr 18, 2023
@godofredoc
Copy link
Contributor Author

\cc @zanderso

@zanderso
Copy link
Member

For the engine repo, this would be a heavy lift with a significant design component. There is no fast/easy way to do this.

@darshankawar darshankawar added in triage Presently being triaged by the triage team infra: security Security-related infra issues and removed in triage Presently being triaged by the triage team labels Apr 18, 2023
@flutter-triage-bot flutter-triage-bot bot added the Bot is counting down the days until it unassigns the issue label May 15, 2024
@flutter-triage-bot
Copy link

This issue is assigned to @godofredoc but has had no recent status updates. Please consider unassigning this issue if it is not going to be addressed in the near future. This allows people to have a clearer picture of what work is actually planned. Thanks!

@zanderso
Copy link
Member

Closing as not planned.

Copy link

This thread has been automatically locked since there has not been any recent activity after it was closed. If you are still experiencing a similar issue, please open a new bug, including the output of flutter doctor -v and a minimal reproduction of the issue.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators May 30, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Bot is counting down the days until it unassigns the issue infra: security Security-related infra issues
Projects
None yet
Development

No branches or pull requests

3 participants