Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[#887] Add OWASP dependency check plugin #890

Open
wants to merge 36 commits into
base: main
Choose a base branch
from

Conversation

ThatSilentCoder
Copy link
Collaborator

@ThatSilentCoder ThatSilentCoder commented Jan 10, 2025

Description

Add a new Gradle plugin that can detect critical dependencies.

Notes

When I added this plugin for the first time to the application and ran the dependencyCheck tasks that this plugin provides, the task took about 40 minutes to run. The reason why it took so long on the very first attempt is because this plugin downloads the NVD (National Vulnerability Database) and caches it somewhere in your system so that in future gradle runs, the plugin can check against the cached database. After the first run, it takes on average between 2-3 minutes per run and if you ever feel the need to upgrade your cached vulnerability database, you can run the ./gradlew dependencyCheckUpdate command.

To see all the tasks that this plugin provides, run ./gradle tasks and go to the dependency-check tasks section.

Test Instructions

  1. To generate a report of all the critical dependencies throughout the entire application, run the following command:
./gradlew dependencyCheckAggregate
  1. To generate a report of each subproject's critical dependencies, run the following command:
./gradlew dependencyCheckAnalyze

Warning: Cannot be merged until the last PR I created has been merged into main.

…urrently replacing dependencies listed in the build.gradle file with the ones referenced in the toml file
…ndencies versions and the ci/cd pipeline in git. will update each depedency slowly to ensure that upgrades are down correctly.
…github's ci/cd is happy still with these set of changes.
…github's ci/cd is happy still with these set of changes (again)
…github's ci/cd is happy still with these set of changes (again) partIII
…is happy still with these set of changes (again)
…s happy still with these set of changes (again)
…guring what to do with the remaining vulnerabilities.
…, now figuring what to do with the remaining vulnerabilities.
…ability issues will be addressed in another PR. I've cut down vulnerabilities by quite a lot and I want to test the new OWASP plugin against the remaining vulnerabilities.
…leproperties-file' into v3_issue_887-add-owasp-dependency-check
…quent runs took about 2-4 minutes. Plugin downloads the NVD (National Vulnerability Database) the very first time the user runs the analyzeDependency command (assuming said user does not already have it cached somewhereon their system. Once downloaded, the plugin checks the subprojects dependenies against that of the NVD's and creates an HTML report per subproject on all the critical dependencies subproject has.
…leproperties-file' into v3_issue_887-add-owasp-dependency-check
…is are found in just the CA Portal dependency. While the appliation builds and runs well as a service, currently running into issues with fixing these dependencies.
…tain vulnerabilites can't be fixed due to the fact that they have to be fixed by outside entities.
@ThatSilentCoder ThatSilentCoder linked an issue Jan 10, 2025 that may be closed by this pull request
@ThatSilentCoder ThatSilentCoder changed the title [ #887] Add OWASP dependency check plugin [#887] Add OWASP dependency check plugin Jan 10, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Add OWASP dependency check
1 participant