SlideShare a Scribd company logo
1 of 30
Download to read offline
Open Source Security and ChatGPT:
Navigating Concerns while Enhancing
Development
with Javier Perez
Chief Evangelist & Sr. Director of Product Management
javierperez.mozello.com
www.linkedin.com/in/javierperez
Tech Evangelist | Open Source Advocate | OSS Program Leader | Product Management
Product Marketing | App Security | Speaker | Blogger | Startups | Ex-Red Hat | Ex-IBM
Javier Perez
Perforce Software
2.6M +
720 packages/day
575K +
182 packages/day
384K +
86 packages/day
475K +
211 packages/day
379K +
161 packages/day
178K +
12 packages/day
Source: Nov 16, 2023 www.modulecounts.com
350+
Projects
850+
Projects
157+
Projects
418+
Projects
30+
Projects
Source: 2022 Foundation annual reports
Source code is publicly available
Open to collaboration
Source code available with a license that
permits users to freely run, study, modify
and redistribute
Freedom to deploy anywhere
Open Source Software
Source: AI-generated with DALL-E
Open source libraries are reused by
other open source
Libraries can have up to 1000s of
dependencies
Same issue with proprietary
software since they are all using OSS
Source: AI-generated with DALL-E
Example: Apache Commons IO Library
Used by:
26,486
artifacts
Apache
Commons
Lang
27,309
AssertJ
16,216
Spring
Web
8,400
Apache
Log4j
10,205 Fastjson
6,347
Snake
YAML
Hadoop
Common
Zoo
Keeper
Selenium
Java
* Source: MavenRepository.com (Nov 16, 2023)
* Sources: graphcommons.com
Example: Apache Commons IO Library
Used by:
26,486
artifacts
Apache
Commons
Lang
27,309
AssertJ
16,216
Spring
Web
8,400
Apache
Log4j
10,205 Fastjson
6,347
Snake
YAML
Hadoop
Common
Zoo
Keeper
Selenium
Java
* Source: MavenRepository.com (Nov 16, 2023)
* Sources: graphcommons.com
It’s about Vulnerabilities
Common Vulnerability and Exposures (CVE)
Common Vulnerability Score System (CVSS)
Vulnerabilities outside CVE and NVD
Open Source Software Security
Source: AI-generated with DALL-E
New vulnerabilities are constantly
being discovered
The smart way to make them public is
when you have a fix (public disclosure)
More than 95% of public vulnerabilities
have a fix, but you must keep up with
the latest releases/patches
Source: AI-generated with DALL-E
OpenAI’s ChatGPT took the world by
storm, over 100 million users in the
first two months after its public launch
ChatGPT or other AI-based tools allow developers
to produce code more quickly and more efficiently
Validity of the Code
Without context the validity of the code can be questioned.
Are developers going to relay entirely on ChatGPT-generated code?
Developers don’t take ChatGPT’s output as the final word.
AI-generated code is should be just the baseline.
Just like using code from Stack Overflow, GitHub, NPM, etc.
C O N C E R N 1
R E S P O N S E
Training Data
ML/DL model training must be fair, robust and explainable.
Where is the data coming from? Garbage in, garbage out.
ChatGPT’s code outputs are not guaranteed to be perfect.
But ChatGPT can explain new or existing code,
it can also effectively provide unit tests for code,
which will help with writing better software faster.
C O N C E R N 2
R E S P O N S E
Ownership
Can I use and distribute AI-generated code?
What about license compliance?
The code that ChatGPT outputs should not be considered
in a final state or copyrightable.
AI-generated code is not supposed to be identical to other code, if it
is, Microsoft cover legal challenges related to copyright grounds
(paid version)
C O N C E R N 3
R E S P O N S E
Job Displacement
AI tools and ChatGPT are going to make
developer jobs redundant.
Deeper testing shows inaccuracies, unreliable code, and content.
ChatGPT won’t immediately create new or different jobs.
Encourage developers and open source developers to embrace
ChatGPT, GitHub Copilot and other tools to explore possibilities.
C O N C E R N 4
R E S P O N S E
Security
AI-generated code is going to
introduce vulnerabilities.
It’s the developer’s responsibility to use code ethically and safely.
It’s also important to carefully review any code generated
by ChatGPT and ensure that it doesn’t introduce
vulnerabilities. Same as it’s done today from other sources.
C O N C E R N 5
R E S P O N S E
ChatGPT has already proven to be an effective educational tool.
Consider asking for book recommendations about
programming languages and coding; it delivers short
descriptions for each book.
Prompt it for the top takeaways from one specific book.
Translate code from one programming language to another.
Other Security Concerns
• Phishing attacks: ChatGPT affords bad
foreign actor to near fluency in English
• Malicious code: AI is programmed not
to generate code that it deems to be
malicious. Code generation can still be
manipulated and updated to create
malicious code, same as any other
source of code.
Source: AI-generated with DALL-E
If ChatGPT can assist bad actors, remember that this same
power is equally available to good actors.
Source: AI-generated with DALL-E
Dev Security Education
• Security Champions Needed
• Knowledge of OWASP Top Ten
Many Contributors
“Given enough eyeballs, all bugs are
shallow” – Linus’ Law
Vulnerabilities in Open Source
Source: AI-generated with DALL-E
OWASP Top 10 Vulnerabilities
• Broken Access Control
• Cryptographic Failures (sensitive data exposure)
• Injection (SQL, NoSQL, OS, LDAP, Cross-site scripting)
• Insecure Design
• Security Misconfiguration
• Vulnerable and Outdated Components (CVEs and EOL software)
• Identification and Authentication Failures
• Software and Data Integrity Failures
• Security Logging & Monitoring Failures
• Server-Side Request Forgery (SSRF)
Top 10
• Identify open source libraries, generate
software bill of materials (SBOMs)
• Identify vulnerabilities and severity on libraries
and dependencies
• Prioritization, alerts, and security policies
• Integrate with build environment (CI pipeline)
Vulnerabilities Scanners
Source: AI-generated with DALL-E
• OWASP Dependency-Checker
• NPM audit
• GitHub vulnerability alerts
• GitLab dependency scanning
• SAP code vulnerability analyzer
Open Source or Free Scanners
Source: AI-generated with DALL-E
SBOMs Generation
• OWASP Dependency-Track
• SBOM Tool (Microsoft)
• Syft and Grype
• CycloneDx-CLI
• OSV-Scanner
Source: AI-generated with DALL-E
Public Vulnerability Databases
National Vulnerability Database nvd.nist.gov
GitHub Advisory Database github.com/advisories
Mend Vulnerability Database
mend.io/vulnerability-database
NPM Security Advisory npmjs.com/advisories
Sonatype OSS Index ossindex.sonatype.org
VulDB vuldb.com
Metasploit rapid7.com/db
Source: AI-generated with DALL-E
“Open Source Security is about
visibility of vulnerabilities, apply
patches, avoid EOL versions, and
making scans part of SDLC.”
“Whether it’s reviewing code,
pair programming or learning
from fellow developers,
humans will not be replaced by
generative AI, only enhanced.”
“Take advantage of the new tools and
treat AI-generated code as any other
code: with bugs and vulnerabilities.”
Chief Evangelist & Sr. Director of Product Management
javierperez.mozello.com
www.linkedin.com/in/javierperez
Javier Perez
Perforce Software
Thank You!
Images generated with OpenAI’s DALL-E via Microsoft Bing Image Creator
Article à

More Related Content

Similar to Open Source Security and ChatGPT-Published.pdf

SPOTLIGHT IGNITE (10 MINUTES): THE FUTURE OF DEVELOPER TOOLS: FROM STACKOVERF...
SPOTLIGHT IGNITE (10 MINUTES): THE FUTURE OF DEVELOPER TOOLS: FROM STACKOVERF...SPOTLIGHT IGNITE (10 MINUTES): THE FUTURE OF DEVELOPER TOOLS: FROM STACKOVERF...
SPOTLIGHT IGNITE (10 MINUTES): THE FUTURE OF DEVELOPER TOOLS: FROM STACKOVERF...DevOpsDays Tel Aviv
 
Introduction To Open Source Licenses
Introduction To Open Source LicensesIntroduction To Open Source Licenses
Introduction To Open Source LicensesHarley Pascua
 
Open source and then some: An Introduction
Open source and then some: An IntroductionOpen source and then some: An Introduction
Open source and then some: An IntroductionAkash Tandon
 
Open Source Compliance at Twitter
Open Source Compliance at TwitterOpen Source Compliance at Twitter
Open Source Compliance at TwitterChris Aniszczyk
 
Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...Rogue Wave Software
 
Build your business on top of Open Source
Build your business on top of Open SourceBuild your business on top of Open Source
Build your business on top of Open SourceAntonio Peric-Mazar
 
Future of Python Certified Professionals in Data Science and Artificial Intel...
Future of Python Certified Professionals in Data Science and Artificial Intel...Future of Python Certified Professionals in Data Science and Artificial Intel...
Future of Python Certified Professionals in Data Science and Artificial Intel...M M Nair
 
Programming tools for developers
Programming tools for developersProgramming tools for developers
Programming tools for developersBBVA API Market
 
Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)dmgerman
 
Sudipta_Mukherjee_Resume_APR_2023.pdf
Sudipta_Mukherjee_Resume_APR_2023.pdfSudipta_Mukherjee_Resume_APR_2023.pdf
Sudipta_Mukherjee_Resume_APR_2023.pdfsudipto801
 
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black DuckSoftware Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black DuckBlack Duck by Synopsys
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldRogue Wave Software
 
Next-gen IDE v2 - OpenSlava 2013-10-11
Next-gen IDE v2 - OpenSlava 2013-10-11Next-gen IDE v2 - OpenSlava 2013-10-11
Next-gen IDE v2 - OpenSlava 2013-10-11Jorge Hidalgo
 
Open Source Software Concepts
Open Source Software ConceptsOpen Source Software Concepts
Open Source Software ConceptsJITENDRA LENKA
 
Top 10 python frameworks for web development in 2020
Top 10 python frameworks for web development in 2020Top 10 python frameworks for web development in 2020
Top 10 python frameworks for web development in 2020Alaina Carter
 
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
Open Source Insight:  NVD's New Look, Struts Vuln Ransomware & Google Open So...Open Source Insight:  NVD's New Look, Struts Vuln Ransomware & Google Open So...
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...Black Duck by Synopsys
 
Best things to know about .net framework
Best things to know about .net frameworkBest things to know about .net framework
Best things to know about .net frameworkShelly Megan
 
Top 10 static code analysis tool
Top 10 static code analysis toolTop 10 static code analysis tool
Top 10 static code analysis toolscmGalaxy Inc
 
CLR_via_CSharp_(Jeffrey_Richter_4th_Edition).pdf
CLR_via_CSharp_(Jeffrey_Richter_4th_Edition).pdfCLR_via_CSharp_(Jeffrey_Richter_4th_Edition).pdf
CLR_via_CSharp_(Jeffrey_Richter_4th_Edition).pdfssuserbe139c
 

Similar to Open Source Security and ChatGPT-Published.pdf (20)

SPOTLIGHT IGNITE (10 MINUTES): THE FUTURE OF DEVELOPER TOOLS: FROM STACKOVERF...
SPOTLIGHT IGNITE (10 MINUTES): THE FUTURE OF DEVELOPER TOOLS: FROM STACKOVERF...SPOTLIGHT IGNITE (10 MINUTES): THE FUTURE OF DEVELOPER TOOLS: FROM STACKOVERF...
SPOTLIGHT IGNITE (10 MINUTES): THE FUTURE OF DEVELOPER TOOLS: FROM STACKOVERF...
 
Introduction To Open Source Licenses
Introduction To Open Source LicensesIntroduction To Open Source Licenses
Introduction To Open Source Licenses
 
Open source and then some: An Introduction
Open source and then some: An IntroductionOpen source and then some: An Introduction
Open source and then some: An Introduction
 
Open Source Compliance at Twitter
Open Source Compliance at TwitterOpen Source Compliance at Twitter
Open Source Compliance at Twitter
 
Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...Best practice recommendations for utilizing open source software (from a lega...
Best practice recommendations for utilizing open source software (from a lega...
 
Build your business on top of Open Source
Build your business on top of Open SourceBuild your business on top of Open Source
Build your business on top of Open Source
 
Future of Python Certified Professionals in Data Science and Artificial Intel...
Future of Python Certified Professionals in Data Science and Artificial Intel...Future of Python Certified Professionals in Data Science and Artificial Intel...
Future of Python Certified Professionals in Data Science and Artificial Intel...
 
Programming tools for developers
Programming tools for developersProgramming tools for developers
Programming tools for developers
 
Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)Introduction to License Compliance and My research (D. German)
Introduction to License Compliance and My research (D. German)
 
Sudipta_Mukherjee_Resume_APR_2023.pdf
Sudipta_Mukherjee_Resume_APR_2023.pdfSudipta_Mukherjee_Resume_APR_2023.pdf
Sudipta_Mukherjee_Resume_APR_2023.pdf
 
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black DuckSoftware Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
Software Security Assurance for DevOps - Hewlett Packard Enterprise + Black Duck
 
Programming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT worldProgramming languages and techniques for today’s embedded andIoT world
Programming languages and techniques for today’s embedded andIoT world
 
Next-gen IDE v2 - OpenSlava 2013-10-11
Next-gen IDE v2 - OpenSlava 2013-10-11Next-gen IDE v2 - OpenSlava 2013-10-11
Next-gen IDE v2 - OpenSlava 2013-10-11
 
Open Source vs Proprietary
Open Source vs ProprietaryOpen Source vs Proprietary
Open Source vs Proprietary
 
Open Source Software Concepts
Open Source Software ConceptsOpen Source Software Concepts
Open Source Software Concepts
 
Top 10 python frameworks for web development in 2020
Top 10 python frameworks for web development in 2020Top 10 python frameworks for web development in 2020
Top 10 python frameworks for web development in 2020
 
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
Open Source Insight:  NVD's New Look, Struts Vuln Ransomware & Google Open So...Open Source Insight:  NVD's New Look, Struts Vuln Ransomware & Google Open So...
Open Source Insight: NVD's New Look, Struts Vuln Ransomware & Google Open So...
 
Best things to know about .net framework
Best things to know about .net frameworkBest things to know about .net framework
Best things to know about .net framework
 
Top 10 static code analysis tool
Top 10 static code analysis toolTop 10 static code analysis tool
Top 10 static code analysis tool
 
CLR_via_CSharp_(Jeffrey_Richter_4th_Edition).pdf
CLR_via_CSharp_(Jeffrey_Richter_4th_Edition).pdfCLR_via_CSharp_(Jeffrey_Richter_4th_Edition).pdf
CLR_via_CSharp_(Jeffrey_Richter_4th_Edition).pdf
 

More from Javier Perez

All Things Open 2022 - State of OSS Security & Support
All Things Open 2022 - State of OSS Security & SupportAll Things Open 2022 - State of OSS Security & Support
All Things Open 2022 - State of OSS Security & SupportJavier Perez
 
Open Source North - State of OSS in Organizations
Open Source North - State of OSS in OrganizationsOpen Source North - State of OSS in Organizations
Open Source North - State of OSS in OrganizationsJavier Perez
 
Intro to open source - 101 presentation
Intro to open source - 101 presentationIntro to open source - 101 presentation
Intro to open source - 101 presentationJavier Perez
 
Open source and AI keynote
Open source and AI keynoteOpen source and AI keynote
Open source and AI keynoteJavier Perez
 
SacHacks Keynote Open Source Software and IBM Z
SacHacks Keynote Open Source Software and IBM ZSacHacks Keynote Open Source Software and IBM Z
SacHacks Keynote Open Source Software and IBM ZJavier Perez
 
All You need to Know about Secure Coding with Open Source Software
All You need to Know about Secure Coding with Open Source SoftwareAll You need to Know about Secure Coding with Open Source Software
All You need to Know about Secure Coding with Open Source SoftwareJavier Perez
 
Guide to open source
Guide to open source Guide to open source
Guide to open source Javier Perez
 

More from Javier Perez (7)

All Things Open 2022 - State of OSS Security & Support
All Things Open 2022 - State of OSS Security & SupportAll Things Open 2022 - State of OSS Security & Support
All Things Open 2022 - State of OSS Security & Support
 
Open Source North - State of OSS in Organizations
Open Source North - State of OSS in OrganizationsOpen Source North - State of OSS in Organizations
Open Source North - State of OSS in Organizations
 
Intro to open source - 101 presentation
Intro to open source - 101 presentationIntro to open source - 101 presentation
Intro to open source - 101 presentation
 
Open source and AI keynote
Open source and AI keynoteOpen source and AI keynote
Open source and AI keynote
 
SacHacks Keynote Open Source Software and IBM Z
SacHacks Keynote Open Source Software and IBM ZSacHacks Keynote Open Source Software and IBM Z
SacHacks Keynote Open Source Software and IBM Z
 
All You need to Know about Secure Coding with Open Source Software
All You need to Know about Secure Coding with Open Source SoftwareAll You need to Know about Secure Coding with Open Source Software
All You need to Know about Secure Coding with Open Source Software
 
Guide to open source
Guide to open source Guide to open source
Guide to open source
 

Recently uploaded

Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.thamaeteboho94
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESfuthumetsaneliswa
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxlionnarsimharajumjf
 
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiCall Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiPriya Reddy
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalFabian de Rijk
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfMahamudul Hasan
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatmentnswingard
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20rejz122017
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathphntsoaki
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lodhisaajjda
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfSkillCertProExams
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar TrainingKylaCullinane
 
Lions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptxLions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptxlionnarsimharajumjf
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIINhPhngng3
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Baileyhlharris
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...ZurliaSoop
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxthusosetemere
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...David Celestin
 

Recently uploaded (20)

Introduction to Artificial intelligence.
Introduction to Artificial intelligence.Introduction to Artificial intelligence.
Introduction to Artificial intelligence.
 
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINESBIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
BIG DEVELOPMENTS IN LESOTHO(DAMS & MINES
 
Zone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptxZone Chairperson Role and Responsibilities New updated.pptx
Zone Chairperson Role and Responsibilities New updated.pptx
 
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. MumbaiCall Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
Call Girls Near The Byke Suraj Plaza Mumbai »¡¡ 07506202331¡¡« R.K. Mumbai
 
Digital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of DrupalDigital collaboration with Microsoft 365 as extension of Drupal
Digital collaboration with Microsoft 365 as extension of Drupal
 
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdfSOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
SOLID WASTE MANAGEMENT SYSTEM OF FENI PAURASHAVA, BANGLADESH.pdf
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20Ready Set Go Children Sermon about Mark 16:15-20
Ready Set Go Children Sermon about Mark 16:15-20
 
History of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth deathHistory of Morena Moshoeshoe birth death
History of Morena Moshoeshoe birth death
 
ICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdfICT role in 21st century education and it's challenges.pdf
ICT role in 21st century education and it's challenges.pdf
 
lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.lONG QUESTION ANSWER PAKISTAN STUDIES10.
lONG QUESTION ANSWER PAKISTAN STUDIES10.
 
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdfAWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
AWS Data Engineer Associate (DEA-C01) Exam Dumps 2024.pdf
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
Lions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptxLions New Portal from Narsimha Raju Dichpally 320D.pptx
Lions New Portal from Narsimha Raju Dichpally 320D.pptx
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait Cityin kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
in kuwait௹+918133066128....) @abortion pills for sale in Kuwait City
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
Jual obat aborsi Jakarta 085657271886 Cytote pil telat bulan penggugur kandun...
 
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptxBEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
BEAUTIFUL PLACES TO VISIT IN LESOTHO.pptx
 
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
Proofreading- Basics to Artificial Intelligence Integration - Presentation:Sl...
 

Open Source Security and ChatGPT-Published.pdf

  • 1. Open Source Security and ChatGPT: Navigating Concerns while Enhancing Development with Javier Perez
  • 2. Chief Evangelist & Sr. Director of Product Management javierperez.mozello.com www.linkedin.com/in/javierperez Tech Evangelist | Open Source Advocate | OSS Program Leader | Product Management Product Marketing | App Security | Speaker | Blogger | Startups | Ex-Red Hat | Ex-IBM Javier Perez Perforce Software
  • 3. 2.6M + 720 packages/day 575K + 182 packages/day 384K + 86 packages/day 475K + 211 packages/day 379K + 161 packages/day 178K + 12 packages/day Source: Nov 16, 2023 www.modulecounts.com
  • 5. Source code is publicly available Open to collaboration Source code available with a license that permits users to freely run, study, modify and redistribute Freedom to deploy anywhere Open Source Software Source: AI-generated with DALL-E
  • 6. Open source libraries are reused by other open source Libraries can have up to 1000s of dependencies Same issue with proprietary software since they are all using OSS Source: AI-generated with DALL-E
  • 7. Example: Apache Commons IO Library Used by: 26,486 artifacts Apache Commons Lang 27,309 AssertJ 16,216 Spring Web 8,400 Apache Log4j 10,205 Fastjson 6,347 Snake YAML Hadoop Common Zoo Keeper Selenium Java * Source: MavenRepository.com (Nov 16, 2023) * Sources: graphcommons.com
  • 8. Example: Apache Commons IO Library Used by: 26,486 artifacts Apache Commons Lang 27,309 AssertJ 16,216 Spring Web 8,400 Apache Log4j 10,205 Fastjson 6,347 Snake YAML Hadoop Common Zoo Keeper Selenium Java * Source: MavenRepository.com (Nov 16, 2023) * Sources: graphcommons.com
  • 9. It’s about Vulnerabilities Common Vulnerability and Exposures (CVE) Common Vulnerability Score System (CVSS) Vulnerabilities outside CVE and NVD Open Source Software Security Source: AI-generated with DALL-E
  • 10. New vulnerabilities are constantly being discovered The smart way to make them public is when you have a fix (public disclosure) More than 95% of public vulnerabilities have a fix, but you must keep up with the latest releases/patches Source: AI-generated with DALL-E
  • 11. OpenAI’s ChatGPT took the world by storm, over 100 million users in the first two months after its public launch
  • 12. ChatGPT or other AI-based tools allow developers to produce code more quickly and more efficiently
  • 13. Validity of the Code Without context the validity of the code can be questioned. Are developers going to relay entirely on ChatGPT-generated code? Developers don’t take ChatGPT’s output as the final word. AI-generated code is should be just the baseline. Just like using code from Stack Overflow, GitHub, NPM, etc. C O N C E R N 1 R E S P O N S E
  • 14. Training Data ML/DL model training must be fair, robust and explainable. Where is the data coming from? Garbage in, garbage out. ChatGPT’s code outputs are not guaranteed to be perfect. But ChatGPT can explain new or existing code, it can also effectively provide unit tests for code, which will help with writing better software faster. C O N C E R N 2 R E S P O N S E
  • 15. Ownership Can I use and distribute AI-generated code? What about license compliance? The code that ChatGPT outputs should not be considered in a final state or copyrightable. AI-generated code is not supposed to be identical to other code, if it is, Microsoft cover legal challenges related to copyright grounds (paid version) C O N C E R N 3 R E S P O N S E
  • 16. Job Displacement AI tools and ChatGPT are going to make developer jobs redundant. Deeper testing shows inaccuracies, unreliable code, and content. ChatGPT won’t immediately create new or different jobs. Encourage developers and open source developers to embrace ChatGPT, GitHub Copilot and other tools to explore possibilities. C O N C E R N 4 R E S P O N S E
  • 17. Security AI-generated code is going to introduce vulnerabilities. It’s the developer’s responsibility to use code ethically and safely. It’s also important to carefully review any code generated by ChatGPT and ensure that it doesn’t introduce vulnerabilities. Same as it’s done today from other sources. C O N C E R N 5 R E S P O N S E
  • 18. ChatGPT has already proven to be an effective educational tool. Consider asking for book recommendations about programming languages and coding; it delivers short descriptions for each book. Prompt it for the top takeaways from one specific book. Translate code from one programming language to another.
  • 19. Other Security Concerns • Phishing attacks: ChatGPT affords bad foreign actor to near fluency in English • Malicious code: AI is programmed not to generate code that it deems to be malicious. Code generation can still be manipulated and updated to create malicious code, same as any other source of code. Source: AI-generated with DALL-E
  • 20. If ChatGPT can assist bad actors, remember that this same power is equally available to good actors. Source: AI-generated with DALL-E
  • 21. Dev Security Education • Security Champions Needed • Knowledge of OWASP Top Ten Many Contributors “Given enough eyeballs, all bugs are shallow” – Linus’ Law Vulnerabilities in Open Source Source: AI-generated with DALL-E
  • 22. OWASP Top 10 Vulnerabilities • Broken Access Control • Cryptographic Failures (sensitive data exposure) • Injection (SQL, NoSQL, OS, LDAP, Cross-site scripting) • Insecure Design • Security Misconfiguration • Vulnerable and Outdated Components (CVEs and EOL software) • Identification and Authentication Failures • Software and Data Integrity Failures • Security Logging & Monitoring Failures • Server-Side Request Forgery (SSRF) Top 10
  • 23. • Identify open source libraries, generate software bill of materials (SBOMs) • Identify vulnerabilities and severity on libraries and dependencies • Prioritization, alerts, and security policies • Integrate with build environment (CI pipeline) Vulnerabilities Scanners Source: AI-generated with DALL-E
  • 24. • OWASP Dependency-Checker • NPM audit • GitHub vulnerability alerts • GitLab dependency scanning • SAP code vulnerability analyzer Open Source or Free Scanners Source: AI-generated with DALL-E
  • 25. SBOMs Generation • OWASP Dependency-Track • SBOM Tool (Microsoft) • Syft and Grype • CycloneDx-CLI • OSV-Scanner Source: AI-generated with DALL-E
  • 26. Public Vulnerability Databases National Vulnerability Database nvd.nist.gov GitHub Advisory Database github.com/advisories Mend Vulnerability Database mend.io/vulnerability-database NPM Security Advisory npmjs.com/advisories Sonatype OSS Index ossindex.sonatype.org VulDB vuldb.com Metasploit rapid7.com/db Source: AI-generated with DALL-E
  • 27. “Open Source Security is about visibility of vulnerabilities, apply patches, avoid EOL versions, and making scans part of SDLC.”
  • 28. “Whether it’s reviewing code, pair programming or learning from fellow developers, humans will not be replaced by generative AI, only enhanced.”
  • 29. “Take advantage of the new tools and treat AI-generated code as any other code: with bugs and vulnerabilities.”
  • 30. Chief Evangelist & Sr. Director of Product Management javierperez.mozello.com www.linkedin.com/in/javierperez Javier Perez Perforce Software Thank You! Images generated with OpenAI’s DALL-E via Microsoft Bing Image Creator Article à