Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

If caller out of scope risk shall not be created for code backdooring rule #73

Closed
wants to merge 1 commit into from

Conversation

ezavgorodniy
Copy link
Collaborator

No description provided.

@ezavgorodniy
Copy link
Collaborator Author

Yevhen Zavhorodnii
11:40 AM
@joerg Reichelt
/
@Christian Schneider
I believe code backdooring rule is not correct, please take a look at PR with fix: #73

Joerg Reichelt
6:01 PM
@yevhen Zavhorodnii
can you explain the scenario? usually risks are created for all assets that are in scope but we don't usually skip rules what adjacent assets (callers, etc.) are out of scope. if you could explain your scenario it would help a lot understanding the reasoning. thanks

Yevhen Zavhorodnii
10:21 PM
What we're saying currently: "if caller is over the internet without VPN or caller is out of scope (even when call make over the VPN)" create risk.
Why is it a risk if call make from caller out of scope if it made over VPN?

Yevhen Zavhorodnii
10:42 PM
Perhaps caller.OutOfScope shall be removed from if condition at all
10:42
Why adding OutOfScope to the caller is adding a risk?

Joerg Reichelt
12:41 AM
I don't think it should make any difference if the caller is in scope or not, I agree with that. this risk should always be created as long as the target is in scope. code backdooring can happen with any code modification, no matter if the caller (source) is in scope of not
12:42
for example, you may pull in code from an open source project. those contributors and the source repo wouldn't be in scope. however, the imported code can still create a backdoor
12:44
similarly, your own developers can introduce a backdoor intentionally (insider threat) or not (by mistake). the developers, their development machine and the repo they push code to would likely be in scope

@ezavgorodniy ezavgorodniy deleted the fix-code-backdooring-rule-out-of-scope branch November 25, 2024 13:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant