Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Practical Approach to Automate the Discovery and Eradication of Open-Source Software Vulnerabilities

Black Hat via YouTube

Overview

This course aims to teach learners a practical approach to automate the discovery and eradication of open-source software vulnerabilities. The learning outcomes include understanding the risks associated with open-source components in web applications, identifying vulnerabilities at scale, and implementing strategies for effective remediation. The course covers skills such as building an open source vulnerability database, vulnerability triage, risk assessment, and security change campaigns. The teaching method involves a talk that describes real-world examples and provides insights into Netflix's approach to handling open-source vulnerabilities. The intended audience for this course includes software developers, security professionals, and individuals interested in cybersecurity and open-source software security.

Syllabus

Intro
The Benefits of Open Source Software
Open source security is a strange thing
Typo squatting
Package Masking
Ownership transfer
Dangling references
Picking a target for infection
How dependencies gets infected?
How can we protect ourselves from supply chain attacks?
Netflix Microservice Architecture
Design principles for our approach
Build open source vulnerability database
Vulnerability Triage
Risk Strategy Table - Example 1
Requirements for effective vulnerability remediation
Understanding minimum version update problem
First order dependency problem
Yarn Selective dependency resolutions - Example
Dependency lock updates
Security Change Campaigns
Security Change Campaign - Blacklist
Vulnerable method use detection
Better remediation (slack bot remediation)
Questions we ask for organizational metrics
Blackhat sound bytes

Taught by

Black Hat

Reviews

Start your review of Practical Approach to Automate the Discovery and Eradication of Open-Source Software Vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.