Skip to content

Commit

Permalink
Readme updates
Browse files Browse the repository at this point in the history
  • Loading branch information
dankohn committed Jun 26, 2015
1 parent b44412b commit 2bda0af
Showing 1 changed file with 16 additions and 12 deletions.
28 changes: 16 additions & 12 deletions README.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,10 @@
# cii-analysis
# Core Infrastructure Initiative Census

Automated review of open source software projects

This work contains programs and documentation to help identify
open source software (OSS) projects that may need investment for security.
These go by various names, e.g., "high value targets".
This project contains programs and documentation to help identify
open source software (OSS) projects that may need additional investment
to improve security.

Key files include:

Expand All @@ -12,28 +13,27 @@ Key files include:
* results.csv: CSV file listing OSS projects and related metrics.
* oss-needing-help.docx : Documentation about this work.

The Python analysis program is released under the MIT license.
The Python program requires "BeautifulSoup" to work.
The program requires an API key from Black Duck Open Hub to work.
The Python analysis program is released under the MIT license and requires "BeautifulSoup" to work. The program requires an [API key](https://github.com/blackducksw/ohloh_api#api-key) from Black Duck Open Hub to work.

The documentation is released under the Creative Commons CC-BY license.

Some supporting data was sourced from the Black Duck Open HUB (formerly Ohloh), a free online community resource for discovering, evaluating, tracking and comparing open source code and projects. We thank Black Duck for the data!

Description of this project
# Description of this project

The Heartbleed vulnerability in OpenSSL highlighted that while some open source
software (OSS) is widely used and depended on, vulnerabilities can have
serious ramifications, and yet some projects have not received the level of
security analysis appropriate to their importance. Some OSS projects have many
participants, perform in-depth security analyses, and produce software that is
widely considered to have high quality and strong security. However, other
OSS projects have small teams that have limited time to do the tasks necessary
for strong security. The trick is to identify quickly which critical projects
for strong security. The trick is to identify which critical projects
fall into the second bucket.

We have focused on automatically gathering metrics, especially those that
suggest less active projects. We also provided a human estimate of the
programs exposure to attack, and developed a scoring system to heuristically
program's exposure to attack, and developed a scoring system to heuristically
combine these metrics. These heuristics identified especially plausible
candidates for further consideration. For our initial set of projects to
examine, we took the set of packages installed by Debian base and added a set
Expand All @@ -43,6 +43,10 @@ We invite you to contribute in the following ways:
- fork the repository and try different metrics and heuristics. Send us pull
requests for the ones that you find experimentally make the most sense.
- fork the repository and try different data sources.
- review the data in projects_to_examin.csv and send corrections and elaborations.
- review the data in projects_to_examine.csv and send corrections and elaborations.
- suggest more projects to consider in the future.
- send in pointers to additional relevant literature in the field.
- open an issue to mention additional relevant literature in the field.

# Background

This work was sponsored by the Linux Foundation's Core Infrastructure Initiative

0 comments on commit 2bda0af

Please sign in to comment.