Google AllStar new security application

Google released a new one for developers that automates the of projects and verifies some to ensure that the project has not been hacked. The new security tool is called and is designed to test and determine if certain critical features have changed.

The AllStar, combined with another Google tool called Scorecard, provides project maintainers with reassurance that their security settings are accurate, according to Jeff Mendoza, chief engineer at Google AllStars.

If developers want, they can also use the software score card to evaluate their project and then automatically provide the appropriate policies with AllStar.all star

Based on 18 distinct criteria, Scorecard evaluates projects, such as whether they are automatically updated, and uses an automated vulnerability detection method to detect defects that are easy to detect.

According to his announcement OpenSSF, Google released the tool as part of an effort to have software like AllStar that anyone can use. The software monitors a repository on GitHub and checks the project to ensure that no unwanted changes are made. The configuration settings are compared to the project security policy and if they do not match, there are "penalties".

Mendoza reports

With the popularity of the open , attackers see a compromised project as a way to penetrate both closed and open systems. Attacks are made from the supply chain side: either with attacks on the code base, or with injections somewhere between the code and the way a project is developed and used in other systems.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.
AllStar, google allstar, iguru, iguru.gr

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).