Red Hat's Dependency Analytics (RHDA) extension gives you awareness to security concerns within your software supply chain while you code your application. The Red Hat Dependency Analytics extension uses vulnerability data sources for the most up-to-date vulnerability information available.
NOTE:
The Red Hat Dependency Analytics extension is an online service hosted and maintained by Red Hat.
Red Hat Dependency Analytics only accesses your manifest files to analyze your application dependencies before displaying the vulnerability report.
IMPORTANT:
Currently, Red Hat Dependency Analytics only supports projects that use Maven (mvn
), Node (npm
), Golang (go mod
), Python (pip
), and Gradle (gradle
) ecosystems.
In future releases, Red Hat plans to support other programming languages.
- Red Hat Dependency Analytics - Table of Contents
Prerequisites
- For Maven projects, analyzing a
pom.xml
file, you must have themvn
binary in your system’sPATH
environment. - For Node projects, analyzing a
package.json
file, you must have thenpm
binary in your system’sPATH
environment. - For Golang projects, analyzing a
go.mod
file, you must have thego
binary in your system’sPATH
environment. - For Python projects, analyzing a
requirements.txt
file, you must have thepython3/pip3
orpython/pip
binaries in your system’sPATH
environment. - For Gradle projects, analyzing a
build.gradle
file, you must have thegradle
binary in your system'sPATH
environment. - For base images in a
Dockerfile
orContainerfile
, you must haveJava version 20
or later.
IMPORTANT:
Visual Studio Code by default executes binaries directly in a terminal found in your system's PATH
environment.
You can configure Visual Studio Code to look somewhere else to run the necessary binaries.
You can configure this by accessing the extension settings.
Click the Workspace tab, search for the word executable, and specify the absolute path to the binary file you want to use for Maven, Node or Golang.
Procedure
- Install Visual Studio Code on your workstation.
- After the installation finishes, open the Visual Studio Code application.
- From the file menu, click View, and click Extensions.
- Search the Marketplace for Red Hat Dependency Analytics.
- Click the Install button to install the extension.
- To start scanning your application for security vulnerabilities, and view the vulnerability report, you can do one of the following:
- Open a manifest file, hover over a dependency marked by the inline Component Analysis, indicated by the wavy-red line under a version number or dependency name, click Quick Fix, and click Detailed Vulnerability Report.
- Open a manifest file, and click the pie chart icon .
- Right click on a manifest file in the Explorer view, and click Red Hat Dependency Analytics Report....
- From the vulnerability pop-up alert message, click Open detailed vulnerability report.
The Red Hat Dependency Analytics extension has some configurable parameters that allows you to customize its behavior according to your preferences.
Procedure
-
Open the Visual Studio Code application.
-
From the file menu, click View, and click Extensions.
-
Find the installed Red Hat Dependency Analytics extension, and click the Gear icon.
-
Click Extension Settings.
Red Hat Dependency Analytics Report File Path :
Specify the local path to create the Red Hat Dependency Analytics report file.
The default path is /tmp/redhatDependencyAnalyticsReport.html
.
IMPORTANT:
The redHatDependencyAnalyticsReportFilePath
setting name has changed to reportFilePath
.
Inline Vulnerability Severity Alerts :
You can set the vulnerability severity alert level to Error
or Warning
for inline notifications of detected vulnerabilities.
Python :
usePythonVirtualEnvironment
: Automates the installation of missing packages in a Python virtual environment.enablePythonBestEffortsInstallation
: Installs Python packages for the Python version is use, disregarding declared versions. This configuration option requires the Match Manifest Versions option set tofalse
, and Use Python Virtual Environment option set totrue
.usePipDepTree
: Use thepipdeptree
command-line tool for building the Python dependency tree. This can enhance analysis time.
Golang :
useGoMVS
: Use the minimal version selection algorithm to select a set of module versions to use when building Go packages.
-
Component analysis
Upon opening a manifest file, such as apom.xml
,package.json
,go.mod
orrequirements.txt
file, a vulnerability scan starts the analysis process. The scan provides immediate inline feedback on detected security vulnerabilities for your application's, and container's dependencies. Such dependencies are appropriately underlined in red, and hovering over it gives you a short summary of the security concern from the available data sources. The summary has the full package name, version number, the amount of known security vulnerabilities, and the highest severity status of said vulnerabilities.NOTE: Add the
target
folder to your.gitignore
file to exclude it from Git monitoring. -
Recommendations and remediation
After running a detailed analysis report on a specific component version, you can view recommendations and remediation by using the Quick Fix... menu. If there is a Red Hat recommended package version available, you can replace your version with Red Hat's version.
IMPORTANT: For Maven projects only, when analyzing apom.xml
file. You must configure Red Hat's generally available (GA) repository to use the recommendations or remediation. Add this repository,https://maven.repository.redhat.com/ga/
, to your project's configuration. -
Docker scanning
Upon opening a Dockerfile, a vulnerability scan starts analyzing the images within the Dockerfile. After the analysis finishes, you can view any recommendations and remediation by clicking the Quick Fix... menu from the highlighted image name. Any recommendations for an alternative image does not replace the current image. By clicking Switch to..., you go to Red Hat's Ecosystem Catalog for the recommended image.
You must have thesyft
andskopeo
binaries installed on your workstation to use the Docker scanning feature. You can specify a specific path to these binaries, and others by settings the following parameters:syft.executable.path
: Specify the absolute path ofsyft
executable.syft.config.path
: Specify the absolute path to the Syft configuration file.skopeo.executable.path
: Specify the absolute path ofskopeo
executable.skopeo.config.path
: Specify the absolute path to the authentication file used by theskopeo inspect
command.docker.executable.path
: Specify the absolute path ofdocker
executable.podman.executable.path
: Specify the absolute path ofpodman
executable.image.platform
: Specify the platform used for multi-arch images.
-
Excluding dependencies with
exhortignore
You can exclude a package from analysis by marking the package for exclusion. How you exclude a package varies based on the your project's language:-
Maven
If you want to ignore vulnerabilities for a dependency in apom.xml
file, you must add<!--exhortignore-->
to the end of the line as a comment against the dependency, group id, artifact id, or version scopes of that particular dependency in the manifest file. For example:<dependency> <!--exhortignore--> <groupId>...</groupId> <artifactId>...</artifactId> <version>...</version> </dependency>
-
Node
If you wish to ignore vulnerabilities for a dependency in apackage.json
file, you must addexhortignore
as a attribute-value pair. The value forexhortignore
is a list of comma-separated vulnerability IDs. This list of vulnerabilities are ignored during analysis. For example:{ "name": "sample", "version": "1.0.0", "description": "", "main": "index.js", "keywords": [], "author": "", "license": "ISC", "dependencies": { "dotenv": "^8.2.0", "express": "^4.17.1", "jsonwebtoken": "^8.5.1", "mongoose": "^5.9.18" }, "exhortignore": [ "jsonwebtoken" ] }
-
Go
If you want to ignore vulnerabilities for a dependency in ago.mod
file, you must add// exhortignore
to the end of the line as a comment against the dependency in the manifest file. For example:require ( golang.org/x/sys v1.6.7 // exhortignore )
-
Python
If you want to ignore vulnerabilities for a dependency in arequirements.txt
file, you must add# exhortignore
to the end of the line as a comment against the dependency in the manifest file. For example:requests==2.28.1 # exhortignore
-
Gradle
If you want to ignore vulnerabilities for a dependency in abuild.gradle
file, you must add// exhortignore
to the end of the line as a comment against the dependency in the manifest file. For example:plugins { id 'java' } group = 'groupName' version = 'version' repositories { mavenCentral() } dependencies { implementation "groupId:artifactId:version" // exhortignore } test { useJUnitPlatform() }
-
-
Excluding developmental or test dependencies
Red Hat Dependency Analytics does not analyze dependencies marked asdev
ortest
, these dependencies are ignored.For example, setting
test
in thescope
tag within apom.xml
file:<dependency> <groupId>...</groupId> <artifactId>...</artifactId> <version>...</version> <scope>test</scope> </dependency>
For example, setting
devDependencies
attributte in thepackage.json
file:{ "name": "sample", "version": "1.0.0", "description": "", "main": "index.js", "keywords": [], "author": "", "license": "ISC", "dependencies": { "dotenv": "^8.2.0", "express": "^4.17.1", "jsonwebtoken": "^8.5.1", "mongoose": "^5.9.18" }, "devDependencies": { "axios": "^0.19.0" } }
For example, setting the
exclude
attribute in thego.mod
file:exclude golang.org/x/sys v1.6.7 exclude ( golang.org/x/sys v1.6.7 )
For example, setting a dependency as test in the
build.gradle
file by placing it under one of the test configurations:testImplementation
,testCompileOnly
,testRuntimeOnly
dependencies { implementation group: 'org.springframework.boot', name: 'spring-boot-starter-web', version: '2.7.4' testImplementation group: 'org.springframework.boot', name: 'spring-boot-starter-test', version: '2.7.4' testCompileOnly 'junit:junit:4.13.1' testRuntimeOnly 'org.mockito:mockito-core:3.3.3' }
For example, creating an alternative file to
requirements.txt
, likerequirements-dev.txt
orrequirements-test.txt
and adding the dev or test dependencies there instead. -
Red Hat Dependency Analytics report
The Red Hat Dependency Analytics report is a temporary HTML file that exist if the Red Hat Dependency Analytics Report tab remains open. Closing the tab removes the temporary HTML file. You can specify the file name by modifying the Red Hat Dependency Analytics: Red Hat Dependency Analytics Report File Path field in the extension settings. -
Python and Go package manager behavior
When a user requests a Python or a Go package analysis, Red Hat Dependency Analytics performs the analysis by looking at the version tags from those environments, and not from the manifest files of those environments. This can result in the user receiving information that does not match their intended request. Because of this behavior, Red Hat Dependency Analytics has a new configurable workspace setting. By default, theMatch Manifest Versions
(MATCH_MANIFEST_VERSIONS) setting restricts Red Hat Dependency Analytics from doing an analysis on package versions that do not match the versions defined by the manifest files. When Red Hat Dependency Analytics finds a package version mis-match, an alert message asks the user to switch this setting. If the user decides to disable this restriction, Red Hat Dependency Analytics performs the analysis on versions given by the package manager only. This setting applies to Python and Go environments.
An alternative workaround exists for Python environments only. The user can start Visual Studio Code with theEXHORT_PYTHON_VIRTUAL_ENV
variable set totrue
. Doing this allows Red Hat Dependency Analytics to install Python packages into a virtual environment to perform the analysis. The benefit is having a clean Python environment not influenced by earlier installations, but the downside is a significantly slower analysis process.
In the Python ecosystem, when selecting both Use Pip Dep Tree
and Use Python Virtual Environment
options simultaneously, the application gives an error because pipdeptree
is not configured for the Python's virtual environment.
Furthermore, there is no practical value in using both configurations together.
Since these options contradict each other, the expected function of the Use Pip Dep Tree
option has not effect when used with the Use Python Virtual Environment
option.
The primary goal of the Use Pip Dep Tree
option is to optimize performance for Python version 3.11 and later.
However, the Use Python Virtual Environment
option works much slower than running in a local environment, because installations happen within the virtual environment.
Red Hat recommends only using one of these options, depending on your specific requirements, but not both simultaneously.
When a manifest includes dependencies with the provided
scope in Maven
or the compileOnly
and compileOnlyApi
configurations in Gradle
, RHDA might not reliably detect vulnerabilities for these dependencies.
This is due to the nature of the scopes and configurations where the version of the dependency used during the build process might not necessarily match the version used at runtime.
This discrepancy occurs because the dependency is not packaged within the application's JAR file, meaning that the runtime environment must supply the necessary artifacts. This can lead to two potential issues:
ClassNotFoundException
: If the runtime environment lacks the required artifacts on itsclasspath
, the application will fail to run due to missing classes.Version Mismatch
: If the runtime environment provides different versions of the artifacts, it can cause application crashes, unexpected security vulnerabilities, or false positives in RHDA vulnerability scans.
Ensure your runtime environment includes the correct versions of these dependencies to avoid such issues.
You can automate the analysis of your application's vulnerabilities within the build and release pipeline. Red Hat offers integration with these Continuous Integration (CI) platforms:
The goal of this project is to significantly enhance a developer's experience by providing helpful vulnerability insights for their applications.
The Red Hat Dependency Analytics Extension for Visual Studio Code collects anonymous usage data and sends it to Red Hat servers to help improve our products and services.
Read our privacy statement to learn more.
This extension respects the redhat.telemetry.enabled
setting, which you can learn more about here.
There are two ways you can contact us:
- You can reach out to us at
[email protected]
with any questions, feedback, and general support. - You can also file a GitHub Issue.
Apache 2.0, See LICENSE for more information.