This repository was archived by the owner on Sep 9, 2020. It is now read-only.
This repository was archived by the owner on Sep 9, 2020. It is now read-only.
Security model #278
Closed
Description
To date, we've generally deferred the harder security questions in the interest of figuring out what we actually want the tool to be. With the basic vision now settled, security is now at the forefront of our considerations.
To start, we need to articulate a security model for dep
; this is just a stub/sketch to get us started.
The essential task of a dependency management system is to select and reproduce a dependency set. Selection should avoid versions of code known to have vulnerabilities, and reproduction should be byte-level precise.
In functional terms, this means a few things:
- Verifying the integrity of code on disk against an expected hash digest (related: Vendor pruning #120)
- Verifying the authenticity of code retrieved from a source over the public internet
- Tracking security issues with and black-listing of released versions (more or less Security service #176)
We needn't necessarily ship a security service as part of 1.9 - speccing and prototyping it is probably sufficient.