Skip to main content

What's a Safe Choice?

How to identify safe open source applications

We have tested the software described here.

Howhttps://github.com/ossf/wg-best-practices-os-developers/blob/main/docs/Concise-Guide-for-Evaluating-Open-Source-Software.md
^ tohelpful

identify

 safe

open

Assessment source

applications

Verify authenticity

Consider necessity. every new service increases the attack surface

Open source license type

Active community

Open to feedback 

Regular updates

Multiple developers

Does the software require an account, especially one that requires you to provide information like your name or email?  WhatMany aboutoss therely forums?on email Areto theybuild publiclya accessiblecommunity by few reputable projects require them.

DOCUMENTATION

Typosqiatting obs


Maintenance & Sustainability

Is there a docker image? 

CodeIs qualityit reports,developer codecreated maintenancecommunity
created or user created?

SecurityActivity auditslevel

TrustedActive repository such as GitHub or gitlabcommunity

Stability;Open numberto offeedback open

issue

Regular reportsupdates

Multiple and or very active forumsdevelopers

Alpha , beta, stable, 

Is the software a proof of concept or a refined software model?

Maintainers and developers are after unpaid. They are passion projects.  While some open source software is funded by foundations, many are small community projects that are self funded by donations.

Code quality reports, code maintenance 

Is it maintained

GitHub badges.  Is it compiling? Etc

Do they offer a way to deploy using docker?

 

Security 

Assessment framework

Trusted repository such as GitHub or gitlab

Security audits

Security Through Transparency

It’s How You Implement Software That Matters

Certifications

Security is not necessarily incorporated into the design and development of OSS.


Many large organizations support OSS projects. However, these projects may rely on work conducted by smaller, volunteer-run OSS projects. For smaller OSS projects, volunteers may have less time to fix problems or conduct security testing. Also, these projects may not receive the funding needed to hire expert security auditors.

How much do they ask for support and in what ways?  Are they building community or exploiting it?

Is it maintained

GitHub badges.  Is it compiling? Etc

Do they offer a way to deploy using docker?

Security Through Transparency

It’s How You Implement Software That Matters

The blueprints (source code) reveal the layout, but they don’t tell you where the alarm system is located or the combination to the safe.

https://github.com/ossf/wg-best-practices-os-developers/blob/main/docs/Concise-Guide-for-Evaluating-Open-Source-Software.md 

Community

Stability; number of open issue reports and or very active forums

^What helpfulabout the forums?  Are they publicly accessible

MaintainerHow Diversitymuch Verifydo thethey presenceask offor moresupport thanand onein maintainer,what ideallyways? from differentAre organizations,they tobuilding reduce single-point-of-failure risk.    

Release Recency     Confirm that the last release was issued within the previous 12 months.    

Communication     Verify the existence of recent releasescommunity or announcementsexploiting from the project maintainer(s).    
it?

Certifications

DOCUMENTATION

Typosqiatting obs