Transparent and efficient vulnerability and patch disclosure are still a challenge in the security community, essentially because of the poor-quality documentation stemming from the lack of standards. SECOM is a recently-proposed standard convention for security commit messages that enables the writing of well-structured and complete commit messages for security patches. The convention prescribes different bits of security-related information essential for a better understanding of vulnerabilities by humans and tools. SECOMlint is an automated and configurable solution to help security and maintenance teams infer compliance against the SECOM standard when submitting patches to security vulnerabilities in their source version control systems. The tool leverages the natural language processing technique Named-Entity Recognition (NER) to extract security-related information from commit messages and uses it to match the compliance standards designed. We demonstrate SECOMlint at https://youtu.be/-1hzpMN_uFI; and documentation and its source code at https://tqrg.github.io/secomlint/.
翻译:安全界仍面临透明和高效的脆弱性和补丁披露的挑战,这主要是因为缺乏标准导致文件质量差,而SECOM是最近提出的一项标准安全公约,它承诺发出信息,以便能够为安全界撰写结构完善和完整的承诺信息;该公约规定了不同部分的安全相关信息,对于更好地了解人类和工具的脆弱性至关重要;SECOMlint是一个自动化和可配置的解决办法,有助于安保和维护小组在提交源版本控制系统中的安全弱点补丁时,判断其遵守SECOM标准的情况;该工具利用自然语言处理技术命名-实体识别(NER),从承诺信息中提取与安全有关的信息,并使用这些信息与设定的遵守标准相匹配;我们在https://youtu.be/-1hzpMN_ufit展示SECOMlint,并在https://tqrg.githuub.io/secomlint/上展示文件及其源代码。