Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

agnos.is Forums

  1. Home
  2. Selfhosted
  3. Do you actually audit open source projects you download?

Do you actually audit open source projects you download?

Scheduled Pinned Locked Moved Selfhosted
selfhosted
74 Posts 63 Posters 288 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • O [email protected]

    The question is simple. I wanted to get a general consensus on if people actually audit the code that they use from FOSS or open source software or apps.

    Do you blindly trust the FOSS community? I am trying to get a rough idea here. Sometimes audit the code? Only on mission critical apps? Not at all?

    Let's hear it!

    D This user is from outside of this forum
    D This user is from outside of this forum
    [email protected]
    wrote on last edited by
    #48

    It depends on the provenance of the code and who (if anyone) is downstream.

    A project that's packaged in multiple distros is more likely to be reliable than a project that only exists on github and provides its own binary builds.

    1 Reply Last reply
    0
    • O [email protected]

      The question is simple. I wanted to get a general consensus on if people actually audit the code that they use from FOSS or open source software or apps.

      Do you blindly trust the FOSS community? I am trying to get a rough idea here. Sometimes audit the code? Only on mission critical apps? Not at all?

      Let's hear it!

      d_air1@lemmy.mlD This user is from outside of this forum
      d_air1@lemmy.mlD This user is from outside of this forum
      [email protected]
      wrote on last edited by
      #49

      Depends on how the project and how long they have been around.

      1 Reply Last reply
      0
      • O [email protected]

        The question is simple. I wanted to get a general consensus on if people actually audit the code that they use from FOSS or open source software or apps.

        Do you blindly trust the FOSS community? I am trying to get a rough idea here. Sometimes audit the code? Only on mission critical apps? Not at all?

        Let's hear it!

        J This user is from outside of this forum
        J This user is from outside of this forum
        [email protected]
        wrote on last edited by
        #50

        some yes, I'm currently using hyde for hyprland and I've been tinkering with almost every script that holds the project together

        1 Reply Last reply
        0
        • O [email protected]

          The question is simple. I wanted to get a general consensus on if people actually audit the code that they use from FOSS or open source software or apps.

          Do you blindly trust the FOSS community? I am trying to get a rough idea here. Sometimes audit the code? Only on mission critical apps? Not at all?

          Let's hear it!

          fizz@lemmy.nzF This user is from outside of this forum
          fizz@lemmy.nzF This user is from outside of this forum
          [email protected]
          wrote on last edited by
          #51

          Nah. My security is entirely based on vibes and gambling

          I 1 Reply Last reply
          20
          • semperverus@lemmy.worldS [email protected]

            Having actually worked with AI in this context alongside github/azure devops advanced security, I can tell you that this is wrong. As much as we hate AI, and as much as people like to (validly) point out issues with hallucinations, overall it's been very on-point.

            N This user is from outside of this forum
            N This user is from outside of this forum
            [email protected]
            wrote on last edited by
            #52

            Could you let me know what sort of models you're using? Everything I've tried has basically been so bad it was quicker and more reliable to to the job myself. Most of the models can barely write boilerplate code accurately and securely, let alone anything even moderately complex.

            I've tried to get them to analyse code too, and that's hit and miss at best, even with small programs. I'd have no faith at all that they could handle anything larger; the answers they give would be confident and wrong, which is easy to spot with something small, but much harder to catch with a large, multi process system spread over a network. It's hard enough for humans, who have actual context, understanding and domain knowledge, to do it well, and I've, personally, not seen any evidence that an LLM (which is what I'm assuming you're referring to) could do anywhere near as well. I don't doubt that they flag some issues, but without a comprehensive, human, review of the system architecture, implementation and code, you can't be sure what they've missed, and if you're going to do that anyway, you've done the job yourself!

            Having said that, I've no doubt that things will improve, programming languages have well defined syntaxes and so they should be some of the easiest types of text for an LLM to parse and build a context from. If that can be combined with enough domain knowledge, a description of the deployment environment and a model that's actually trained for and tuned for code analysis and security auditing, it might be possible to get similar results to humans.

            semperverus@lemmy.worldS 1 Reply Last reply
            0
            • F [email protected]

              For personal use? I never do anything that would qualify as "auditing" the code. I might glance at it, but mostly out of curiosity. If I'm contributing then I'll get to know the code as much as is needed for the thing I'm contributing, but still far from a proper audit. I think the idea that the open-source community is keeping a close eye on each other's code is a bit of a myth. No one has the time, unless someone has the money to pay for an audit.

              I don't know whether corporations audit the open-source code they use, but in my experience it would be pretty hard to convince the typical executive that this is something worth investing in, like cybersecurity in general. They'd rather wait until disaster strikes then pay more.

              A This user is from outside of this forum
              A This user is from outside of this forum
              [email protected]
              wrote on last edited by [email protected]
              #53

              My company only allows downloads from official sources, verified publishers, signed where we can. This is enforced by only allowing the repo server to download stuff and only from places we’ve configured. In general those go through a process to reduce the chances of problems and mitigate them quickly.

              We also feed everything through a scanner to flag known vulnerabilities, unacceptable licenses

              If it’s fully packaged installable software, we have security guys that take a look at I have no idea what they do and whether it’s an audit

              I’m actually going round in circles with this one developer. He needs an open source package and we already cache it on the repo server in several form factors, from reputable sources ….. but he wants to run a random GitHub component which downloads an unsigned tar file from an untrusted source

              1 Reply Last reply
              0
              • A [email protected]

                I know lemmy hates AI but auditing open source code seems like something it could be pretty good at. Maybe that's something that may start happening more.

                A This user is from outside of this forum
                A This user is from outside of this forum
                [email protected]
                wrote on last edited by [email protected]
                #54

                I’m actually planning to do an evaluation of a n ai code review tool to see what it can do. I’m actually somewhat optimistic that it could do this better than it can code

                I really want to sic it on this one junior programmer who doesn’t understand that you can’t just commit ai generated slop and expect it to work. This last code review after over 60 pieces of feedback I gave up on the rest and left it as he needs to understand when ai generated slop needs help

                Ai is usually pretty good at unit tests but it was so bad. Randomly started using a different mocking framework, it actually mocked entire classes and somehow thought that was valid to test them. Wasting tests on non-existent constructors no negative tests, tests without verifying anything. Most of all there were so many compile errors, yet he thought that was fine

                1 Reply Last reply
                0
                • fizz@lemmy.nzF [email protected]

                  Nah. My security is entirely based on vibes and gambling

                  I This user is from outside of this forum
                  I This user is from outside of this forum
                  [email protected]
                  wrote on last edited by
                  #55

                  Hell yeah brother!

                  1 Reply Last reply
                  1
                  • O [email protected]

                    The question is simple. I wanted to get a general consensus on if people actually audit the code that they use from FOSS or open source software or apps.

                    Do you blindly trust the FOSS community? I am trying to get a rough idea here. Sometimes audit the code? Only on mission critical apps? Not at all?

                    Let's hear it!

                    drunkanroot@sh.itjust.worksD This user is from outside of this forum
                    drunkanroot@sh.itjust.worksD This user is from outside of this forum
                    [email protected]
                    wrote on last edited by
                    #56

                    depends like for known projecte like curl i wont because i know its fine but if its a new project i heard about i do audit the source and if i dont know the lang its in i ask someone that does

                    1 Reply Last reply
                    1
                    • N [email protected]

                      Could you let me know what sort of models you're using? Everything I've tried has basically been so bad it was quicker and more reliable to to the job myself. Most of the models can barely write boilerplate code accurately and securely, let alone anything even moderately complex.

                      I've tried to get them to analyse code too, and that's hit and miss at best, even with small programs. I'd have no faith at all that they could handle anything larger; the answers they give would be confident and wrong, which is easy to spot with something small, but much harder to catch with a large, multi process system spread over a network. It's hard enough for humans, who have actual context, understanding and domain knowledge, to do it well, and I've, personally, not seen any evidence that an LLM (which is what I'm assuming you're referring to) could do anywhere near as well. I don't doubt that they flag some issues, but without a comprehensive, human, review of the system architecture, implementation and code, you can't be sure what they've missed, and if you're going to do that anyway, you've done the job yourself!

                      Having said that, I've no doubt that things will improve, programming languages have well defined syntaxes and so they should be some of the easiest types of text for an LLM to parse and build a context from. If that can be combined with enough domain knowledge, a description of the deployment environment and a model that's actually trained for and tuned for code analysis and security auditing, it might be possible to get similar results to humans.

                      semperverus@lemmy.worldS This user is from outside of this forum
                      semperverus@lemmy.worldS This user is from outside of this forum
                      [email protected]
                      wrote on last edited by
                      #57

                      Its just whatever is built into copilot.

                      You can do a quick and dirty test by opening copilot chat and asking it something like "outline the vulnerabilities found in the following code, with the vulnerabilities listed underneath it. Outline any other issues you notice that are not listed here." and then paste the code and the discovered vulns.

                      1 Reply Last reply
                      0
                      • O [email protected]

                        The question is simple. I wanted to get a general consensus on if people actually audit the code that they use from FOSS or open source software or apps.

                        Do you blindly trust the FOSS community? I am trying to get a rough idea here. Sometimes audit the code? Only on mission critical apps? Not at all?

                        Let's hear it!

                        ikidd@lemmy.worldI This user is from outside of this forum
                        ikidd@lemmy.worldI This user is from outside of this forum
                        [email protected]
                        wrote on last edited by [email protected]
                        #58

                        If it looks sketchy I'll look at it and not trust the binaries. I'm not going to catch anything subtle, but if it sets up a reverse shell, I can notice that shit.

                        1 Reply Last reply
                        0
                        • O [email protected]

                          The question is simple. I wanted to get a general consensus on if people actually audit the code that they use from FOSS or open source software or apps.

                          Do you blindly trust the FOSS community? I am trying to get a rough idea here. Sometimes audit the code? Only on mission critical apps? Not at all?

                          Let's hear it!

                          G This user is from outside of this forum
                          G This user is from outside of this forum
                          [email protected]
                          wrote on last edited by
                          #59

                          I don't have the know how to do so, so I go off of what others have said about it. It's at-least got a better chance of being safe than closed source software where people are FULLY guessing at if its safe or not, rather than what we have with at-least 1 person having poured over it that doesn't have ties to the creator.

                          1 Reply Last reply
                          1
                          • O [email protected]

                            The question is simple. I wanted to get a general consensus on if people actually audit the code that they use from FOSS or open source software or apps.

                            Do you blindly trust the FOSS community? I am trying to get a rough idea here. Sometimes audit the code? Only on mission critical apps? Not at all?

                            Let's hear it!

                            F This user is from outside of this forum
                            F This user is from outside of this forum
                            [email protected]
                            wrote on last edited by
                            #60

                            No, so I only use well known widely used open source programs. If I'm doing a code review I'm getting paid to do it.

                            1 Reply Last reply
                            0
                            • O [email protected]

                              The question is simple. I wanted to get a general consensus on if people actually audit the code that they use from FOSS or open source software or apps.

                              Do you blindly trust the FOSS community? I am trying to get a rough idea here. Sometimes audit the code? Only on mission critical apps? Not at all?

                              Let's hear it!

                              jagged_circle@feddit.nlJ This user is from outside of this forum
                              jagged_circle@feddit.nlJ This user is from outside of this forum
                              [email protected]
                              wrote on last edited by
                              #61

                              I rely on Debian repo maintainers to do this for me

                              1 Reply Last reply
                              1
                              • O [email protected]

                                The question is simple. I wanted to get a general consensus on if people actually audit the code that they use from FOSS or open source software or apps.

                                Do you blindly trust the FOSS community? I am trying to get a rough idea here. Sometimes audit the code? Only on mission critical apps? Not at all?

                                Let's hear it!

                                jagged_circle@feddit.nlJ This user is from outside of this forum
                                jagged_circle@feddit.nlJ This user is from outside of this forum
                                [email protected]
                                wrote on last edited by
                                #62

                                I usually just look for CVEs. The biggest red flag is if there's 0 CVEs. The yellow flag is if the CVEs exist, but they don't have a prominent notice on their site about it.

                                Best case is they have a lot of CVEs, they have detailed notices on their sites that were published very shortly after the CVE was published, and they have an bug bounty program setup.

                                P 1 Reply Last reply
                                0
                                • vk6flab@lemmy.radioV [email protected]

                                  I run projects inside Docker on a VM away from important data. It allows me to test and restrict access to specific things of my choosing.

                                  It works well for me.

                                  jagged_circle@feddit.nlJ This user is from outside of this forum
                                  jagged_circle@feddit.nlJ This user is from outside of this forum
                                  [email protected]
                                  wrote on last edited by
                                  #63

                                  Oof, you are infected

                                  1 Reply Last reply
                                  0
                                  • jagged_circle@feddit.nlJ [email protected]

                                    I usually just look for CVEs. The biggest red flag is if there's 0 CVEs. The yellow flag is if the CVEs exist, but they don't have a prominent notice on their site about it.

                                    Best case is they have a lot of CVEs, they have detailed notices on their sites that were published very shortly after the CVE was published, and they have an bug bounty program setup.

                                    P This user is from outside of this forum
                                    P This user is from outside of this forum
                                    [email protected]
                                    wrote on last edited by
                                    #64

                                    What if the software is just so flawlessly written that there are not CVEs?

                                    /s

                                    C 1 Reply Last reply
                                    0
                                    • P [email protected]

                                      What if the software is just so flawlessly written that there are not CVEs?

                                      /s

                                      C This user is from outside of this forum
                                      C This user is from outside of this forum
                                      [email protected]
                                      wrote on last edited by
                                      #65

                                      I maintained an open-source app for many years. It leveraged a crypto library but allowed for different algos, or none at all for testing.

                                      Some guy wrote a CVE about "when I disable all crypto it doesn't use crypto". So there's that. It's the only CVE we got before or during my time.

                                      But even we got one.

                                      P 1 Reply Last reply
                                      2
                                      • C [email protected]

                                        I maintained an open-source app for many years. It leveraged a crypto library but allowed for different algos, or none at all for testing.

                                        Some guy wrote a CVE about "when I disable all crypto it doesn't use crypto". So there's that. It's the only CVE we got before or during my time.

                                        But even we got one.

                                        P This user is from outside of this forum
                                        P This user is from outside of this forum
                                        [email protected]
                                        wrote on last edited by
                                        #66

                                        Oh damn, haha.

                                        1 Reply Last reply
                                        0
                                        • O [email protected]

                                          The question is simple. I wanted to get a general consensus on if people actually audit the code that they use from FOSS or open source software or apps.

                                          Do you blindly trust the FOSS community? I am trying to get a rough idea here. Sometimes audit the code? Only on mission critical apps? Not at all?

                                          Let's hear it!

                                          V This user is from outside of this forum
                                          V This user is from outside of this forum
                                          [email protected]
                                          wrote on last edited by
                                          #67

                                          Depends on what you mean by "audit".

                                          I look at the GitHub repo.

                                          • How many stars?
                                          • Last commit?
                                          • Open issues
                                          • Contributer count

                                          Do I read the whole code base? Of course not. But this is way more than I can do with closed source software.

                                          1 Reply Last reply
                                          12
                                          Reply
                                          • Reply as topic
                                          Log in to reply
                                          • Oldest to Newest
                                          • Newest to Oldest
                                          • Most Votes


                                          • Login

                                          • Login or register to search.
                                          • First post
                                            Last post
                                          0
                                          • Categories
                                          • Recent
                                          • Tags
                                          • Popular
                                          • World
                                          • Users
                                          • Groups