The document outlines Snyk's approach to developer-centric security, emphasizing the need for practical tools to address vulnerabilities in open-source libraries, containers, and application code. It discusses the importance of integrating security throughout the development process and provides information on various Snyk tools that assist in identifying and fixing security risks. Additionally, it highlights initiatives like Capture The Flag (CTF) competitions to make security education engaging for developers.
Introduction of Snyk, a developer-first security tool. Key objectives include understanding application security risks.
Highlighting the significance of developer-first security approach. Discusses various security risks from open source libraries and containers.
Overview of Snyk's platform capabilities: Code, Open Source, Container, and Infrastructure as Code security intelligence.
Deep dive into open source security risks including vulnerabilities in code and supply chain security.
Identifying vulnerabilities in containers, emphasizing the importance of managing libraries in container images.
Functionality of Snyk app in continuously scanning applications for vulnerabilities.
Discussion on security challenges in Infrastructure as Code and identifying common issues in open-source libraries.
Engagement in hacking a Node.js application to understand real-world vulnerabilities.
Shifting to DevSecOps for continuous security integration during the software development lifecycle.
Using Snyk for effective vulnerability scanning, assessment and prioritization in software projects.
CTF as a gamified learning experience for security awareness, with details about the upcoming events.Summary of the importance of securing code and infrastructure, along with resources for further learning.
Liran Tal
@liran_tal
Developer Advocate@Snyk
Node.js Foundation
ecosystem security working group
Reach out on Twitter and say hi 👋
OWASP Project Lead
GitHub Star
3.
@liran_tal
Introduction to OpenSource Security
Meet Snyk:
Practical Developer-first Security Tooling
Key
Learning
Objectives Play the Hacker 🎩
@liran_tal
Application’s Security Risks
OpenSource
Libraries
Containers
App Code
IaC
Relying on open source software.
What’s your security and compliance strategy?
100s of Linux packages, and their
vulnerabilities, inherited with base images
#1 cloud vulnerability is misconfiguration [NSA]
Deployed daily - waterfall approach doesn’t
scale. Scans can’t take hours.
10-20% of
codebase
80-90% of
codebase
@liran_tal
FROM node
RUN apt-getupdate
RUN apt-get install -y imagemagick
COPY . /usr/src/goof
WORKDIR /usr/src/goof
RUN npm install
CMD ["npm", "start"]
Big image, many
(vulnerable) libraries?
Containers
@liran_tal
FROM node
RUN apt-getupdate
RUN apt-get install -y imagemagick
COPY . /usr/src/goof
WORKDIR /usr/src/goof
RUN npm install
CMD ["npm", "start"]
Common software
vulnerable?
Containers
@liran_tal
Filters the noise,“take home” with --json
Agnostic
Snyk CLI Use it as a linter
Tip: can run code and container scans too
Tip: can scan many ecosystem manifests
Tip: ad-hoc scan an npm package@version
45.
@liran_tal
Filters the noise,“take home” with --json
Agnostic
Snyk CLI Use it as a linter
Tip: can run code and container scans too
Tip: can scan many ecosystem manifests
Tip: ad-hoc scan an npm package@version
What is aCTF?
Capture the Flag (CTF) is a competition where
teams and individuals compete to solve
security challenges.
● You win by solving the most challenges the
fastest.
CTFs gamify security education, making it fun
and hands-on.
● Participants often exploit vulnerabilities in
webpages or servers to uncover flags.
Supported Languages:
● C#
●Go
● Java
● JavaScript
● PHP
● Python
● Ruby
● TypeScript
Ground Rules:
● Must be GitHub
● Must be Public
● Let’s make a REAL difference
The Developer Challenge
https://nodeconf.snykchallenge.io/