遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/2317)
<a href="https://www.bestpractices.dev/projects/2317"><img src="https://www.bestpractices.dev/projects/2317/badge"></a>
Falco is an open-source runtime security project. Falco is a cloud-native security tool designed for Linux systems. It employs custom rules on kernel events, which are enriched with container and Kubernetes metadata, to provide real-time alerts. Falco helps you gain visibility into abnormal behavior, potential security threats, and compliance violations, contributing to comprehensive runtime security.
https://github.com/falcosecurity/falco/blob/master/OWNERS
Example: https://github.com/falcosecurity/falco/blob/dev/userspace/falco/falco.cpp
https://github.com/falcosecurity/falco/blob/dev/userspace/falco/falco.cpp
Repository on GitHub, which uses git. git is distributed.
Integration test suite: https://github.com/falcosecurity/falco/blob/master/test/README.md
Unit test suite: make tests
Repositories in the Falco organization have each their own tests that are executed at every pull request (before and after merging to the main branch) and/or every release and/or nightly.
Most of the testing pipelines are implemented with GitHub Actions. All the tests are connected with GitHub status checks to effectively show the results to every contributor that integrates new code.
警告:需要URL,但找不到URL。
// X-Content-Type-Options was not set to "nosniff".
Integrating automated fuzzing support for Falco has been proposed by maintainers, and specific case studies have been conducted by a specialized security firm during the 2023 security audit. The analysis and results can be found in the report: https://github.com/falcosecurity/falco/blob/master/audits/SECURITY_AUDIT_2023_01_23-01-1097-LIV.pdf . The Falco maintainers and community are interested in pursuing efforts to overcome the limitations discovered in the analysis and set up effective fuzzing for the project.
The userspace portions of the Falco source code that are written in C and C++ can be compiled and executed with AddressSanitizer. The test suites are also automatically executed at each pull request and release with AddressSanitizer checks and runtime assertions enabled which halt the build upon failure.
后退