遵循以下最佳实践的项目将能够自愿的自我认证,并显示他们已经实现了核心基础设施计划(OpenSSF)徽章。 显示详细资料
[](https://www.bestpractices.dev/projects/843)
<a href="https://www.bestpractices.dev/projects/843"><img src="https://www.bestpractices.dev/projects/843/badge"></a>
OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependencies.
Repository on GitHub, which uses git. git is distributed.
The application uses travis-ci to build, each release is tagged. As such, the build should be reproducible.
警告:需要URL,但找不到URL。
test suite can be run using mvn verify
mvn verify
The application uses travis-ci: https://travis-ci.org/jeremylong/DependencyCheck
All URLs used in the default configuration are HTTPS.
警告:需要更长的理由。
Bintray, where users can download the CLI does not appear to set these headers; however, I do not control this site: https://securityheaders.io/?q=https%3A%2F%2Fbintray.com%2Fjeremy-long%2Fowasp&followRedirects=on
Maven Central, a main distribution point does not set these headers; however, I do not control this site: https://securityheaders.io/?q=https%3A%2F%2Fsearch.maven.org%2F&followRedirects=on One or more of the required security hardening headers is missing.
As this is a build plugin, there are fewer hardening mechanisms that need to be in place. However, one of the major ones is XML validation with prevention against XXE/XEE.
This suggested practice is not practical for a build tool such as dependency-check. There is no UI to test.
Dynamic analysis does not occur as this is not a web application.
后退