Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Identify security-features-of-interest within binaries #2434

Closed
wagoodman opened this issue Dec 15, 2023 · 1 comment · Fixed by #2443
Closed

Identify security-features-of-interest within binaries #2434

wagoodman opened this issue Dec 15, 2023 · 1 comment · Fixed by #2443
Assignees

Comments

@wagoodman
Copy link
Contributor

wagoodman commented Dec 15, 2023

(From a conversation with @joshbressers )

What would you like to be added:
For each binary discovered in the scanned artifact (or if the artifact is a binary) denote the memory protection mechanisms being used (e.g. stack canaries, nx, relro, etc). This would be extra metadata attached to each file object (not package) that denotes the specific properties of interest.

Why is this needed:
This may be useful for folks that are trying to use SBOMs as a way to ensure that memory-safe practices are being followed and better figure a risk posture (without needing access to the original artifact for common cases).

Additional context:

@wagoodman
Copy link
Contributor Author

I've crafted a PoC PR in #2443, however, there is still one missing element (selfrando) and a few more housekeeping tasks left. I won't be able to pick this up for a while, but for anyone interested in taking this across the finish line please shout out here to coordinate 🙏 .

# for free to join this conversation on GitHub. Already have an account? # to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant