TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Show HN: Bearer – Open-source code security scanning solution (SAST)

106 点作者 gmontard大约 2 年前
Hi HN,<p>we’re the co-founders of Bearer, and today we launch an open-source alternative to code security solutions such as Snyk Code, SonarQube, or Checkmarx. Essentially, we help security &amp; engineering teams to discover, filter and prioritize security risks and vulnerabilities in their codebase, with a unique approach through sensitive data (PII, PD, PHI).<p>Our website is at <a href="https:&#x2F;&#x2F;www.bearer.com" rel="nofollow">https:&#x2F;&#x2F;www.bearer.com</a> and our GitHub is here: <a href="https:&#x2F;&#x2F;github.com&#x2F;bearer&#x2F;bearer">https:&#x2F;&#x2F;github.com&#x2F;bearer&#x2F;bearer</a><p>We are not originally Security experts but have been software developers and engineering leaders for over 15 years now, and we thought we could provide a new perspective to security products with a strong emphasis on the developer experience, something we often found lacking for security tools.<p>In addition to building a true developer-friendly security solution, we’ve also heard a lot of teams complaining about how noisy their static code security solutions are. As a result, they often have difficulties triaging the most important issues, and ultimately it’s difficult to remediate them. We believe an important part of the problem lies in the fact that we lack a clear understanding of the real impact of any security issues. Without that understanding, it’s very difficult to ask developers to remediate critical security flaws.<p>We’ve built a unique approach to this problem, by looking at the impact of security issues through the lens of sensitive data. Interestingly, most security team ultimate responsibility today is to secure those sensitive data and protect their organization from costly data loss and leakage, but until today, that connection has never been made.<p>In practical terms, we provide a set of rules that assess the variety of ways known code vulnerabilities (CWE) ultimately impact your application security, and we reconcile it with your sensitive data flows. At the time of this writing, Bearer provides over 100 rules.<p>Here are some examples of what those rules can detect: - Leakage of sensitive data through cookies, internal loggers, third-party logging services, and into analytics environments. - Non-filtered user input that can lead to breaches of sensitive information. - Usage of weak encryption libraries or misusage of encryption algorithms. - Unencrypted incoming and outgoing communication (HTTP, FTP, SMTP) of sensitive information. - Hard-coded secrets and tokens. - And many you can find see here: <a href="https:&#x2F;&#x2F;docs.bearer.com&#x2F;reference&#x2F;rules&#x2F;" rel="nofollow">https:&#x2F;&#x2F;docs.bearer.com&#x2F;reference&#x2F;rules&#x2F;</a><p>Rules are easily extendable to allow you to create your own, everything is YAML based. For example, some of our early users used this system to detect the leakage of sensitive data in their backup environments or missing application-level encryption of their health data.<p>I’m sure you are wondering how can we detect sensitive data flows just by looking at the code. Essentially, we also perform static code analysis to detect those. In a nutshell, we look for those sensitive data flows at two levels: - Analyzing class names, methods, functions, variables, properties, and attributes. It then ties those together to detected data structures. It does variable reconciliation etc. - Analyzing data structure definitions files such as OpenAPI, SQL, GraphQL, and Protobuf.<p>Then we pass this over to a classification engine that assess 120+ data types from sensitive data categories such as Personal Data (PD), Sensitive PD, Personally identifiable information (PII), and Personal Health Information (PHI). All of that is documented here: <a href="https:&#x2F;&#x2F;docs.bearer.com&#x2F;explanations&#x2F;discovery-and-classification&#x2F;" rel="nofollow">https:&#x2F;&#x2F;docs.bearer.com&#x2F;explanations&#x2F;discovery-and-classific...</a><p>As we said before, developer experience is key, that’s why you can install Bearer in 15 seconds, from cURL, Homebrew, apt-get, yum, or as a docker image. Then you run it as a CLI locally, or as part of your CI&#x2F;CD.<p>We currently support JavaScript and Ruby stacks, but more will follow shortly!<p>Please let us know what you think and check out the repo here: <a href="https:&#x2F;&#x2F;github.com&#x2F;Bearer&#x2F;bearer">https:&#x2F;&#x2F;github.com&#x2F;Bearer&#x2F;bearer</a>

14 条评论

dang大约 2 年前
Vote manipulation is against HN&#x27;s rules and will get you banned here, so please don&#x27;t do it again.<p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;g_montard&#x2F;status&#x2F;1633119734991405058" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;g_montard&#x2F;status&#x2F;1633119734991405058</a><p><a href="https:&#x2F;&#x2F;twitter.com&#x2F;g_montard&#x2F;status&#x2F;1633119274838392841" rel="nofollow">https:&#x2F;&#x2F;twitter.com&#x2F;g_montard&#x2F;status&#x2F;1633119274838392841</a><p>This is the one point that&#x27;s in both the site guidelines and the FAQ:<p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;newsguidelines.html" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;newsguidelines.html</a><p><a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;newsfaq.html" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;newsfaq.html</a>
评论 #35066621 未加载
cfabianski大约 2 年前
Hello HN community,<p>I&#x27;m Cédric Fabianski, Co-founder and CTO @ Bearer.<p>This is a big milestone for me personally and I&#x27;m super happy to be able to contribute to the Security space and help improve the security of others&#x27; applications.<p>This is by far the most challenging project I&#x27;ve ever worked on but as people say, if you don&#x27;t make security simple and accessible enough, there is no way engineers are going to care about it.<p>Let me know what you think! Any feedback is more than welcome!!
评论 #35074384 未加载
mdaniel大约 2 年前
Elastic 2, for those who care about such things: <a href="https:&#x2F;&#x2F;github.com&#x2F;Bearer&#x2F;bearer&#x2F;blob&#x2F;v1.0.0&#x2F;LICENSE.txt">https:&#x2F;&#x2F;github.com&#x2F;Bearer&#x2F;bearer&#x2F;blob&#x2F;v1.0.0&#x2F;LICENSE.txt</a>
评论 #35057356 未加载
smcleod大约 2 年前
Always great to see more SAST options.<p>&quot;Contact Us&quot; for pricing immediately disqualifies any product I&#x27;m looking at however, I&#x27;d suggest making pricing very clear on the site.
评论 #35059200 未加载
scinerio大约 2 年前
How does this compare with Semgrep, which to my understanding is the dominating open-source SAST offering to date?
评论 #35058177 未加载
tyingq大约 2 年前
The big missing feature for these kinds of tools is a workflow and relationship for dev teams to mark findings. Marking them as &quot;false positive&quot; or &quot;only applies if these other conditions are true&quot;, or &quot;yes, but we have a mitigation&#x2F;exception&quot;. etc. A fast workflow that allows for less blockers, reduced noise and a focus on things that actually matter.
评论 #35060729 未加载
评论 #35057682 未加载
评论 #35058410 未加载
评论 #35089168 未加载
评论 #35058526 未加载
ac大约 2 年前
First of all, thank you for making and sharing this. I have a few technical questions, if I may.<p>Does Bearer perform data-flow analysis? If so:<p>1. Is the analysis inter-procedural?<p>2. Is it sound? (Does it only report findings that it’s absolutely certain in but missing others; or does it report all possible findings even if some of them report false positives)<p>3. How are sources and sinks of information specified?<p>4. I see it supports JavaScript and Ruby. Any plans on adding other languages? Is the current analysis implementation amenable to adding support for other languages?<p>5. What’s the analysis behavior around dynamic language constructs (e.g. eval)?<p>6. What’s the analysis behavior around missing symbols&#x2F;dependencies?
评论 #35067367 未加载
spuz大约 2 年前
This is a great looking project - we&#x27;ve been looking for tools similar to this to add an extra layer of validation to our codebase. Are you thinking about supporting Java in the future?
评论 #35056688 未加载
评论 #35058883 未加载
itake大约 2 年前
I wish these tools would just auto fix it for me. I hate messages like this:<p>&gt; CRITICAL: Only communicate using SFTP connections.<p>If you know what’s wrong, then fix it. My integration or unit tests will fail if your fix doesn’t work.
评论 #35058553 未加载
评论 #35059824 未加载
deepakprab大约 2 年前
Tracking and mapping where your sensitive data goes is challenging and manual approaches always fall short. This is a very unique unique approach to preventing sensitive data leakage.
AlphaWeaver大约 2 年前
Also check out Wazuh, for another great solution in this area.
评论 #35058949 未加载
kwi大约 2 年前
Excellent product! I was a bit skeptical, but it worked on the first try on my Rails app and helped me discover a few issues!
alexandre_i大约 2 年前
Had the chance to try it a few weeks ago. Took only a couple of minutes to setup, and It gave me a a few interesting warnings about PII on one of my projects.<p>Feels like it would be a great tool for a team that is just starting to pay attention to security risks and vulnerabilities.<p>Will follow next evolutions of your tool, thanks for sharing!
thorhammer88大约 2 年前
Congrats Bearer team, looks awesome