SlideShare a Scribd company logo
Copyright © nexB Inc. License: CC-BY-SA-4.0
“State of the Tooling”
in Open Source Automation
OpenChain German work group
Philippe Ombredanne, AboutCode.org nexB Inc.
Copyright © nexB Inc. License: CC-BY-SA-4.0
Philippe Ombredanne
► Project lead and maintainer for VulnerableCode, ScanCode and AboutCode
► Creator of Package URL, co-founder of SPDX & ClearlyDefined
► FOSS veteran, long time Google Summer of Code mentor
► Co-founder and CTO of nexB Inc., makers of DejaCode
► Weird facts and claims to fame
● Signed off on the largest deletion of lines of code in the Linux kernel
(but these were only comments)
● Unrepentant code hoarder. Had 60,000+ GH forks
now down only to 20K forks
► pombredanne@nexb.com irc:pombreda
Copyright © nexB Inc. License: CC-BY-SA-4.0
Why open source compliance tooling?
▷ Because open source for open source: This is the way!
● Dogfooding
▷ Free as in beer and freedom of course
● Code of course, but do not forget the data!
▷ Key to enable right-sized automation for your open chain
▷ Best-in-class tools in several areas
Copyright © nexB Inc. License: CC-BY-SA-4.0
Key trends (1) Time to retool?
▷ 3rd wave of Compliance tooling creation and adoption underway
● 1st wave was commercial
● 2nd wave was centered on license compliance and legal
● 3rd wave will be centered on developers and appsec
■ Eventually balanced and holistic FOSS solutions
▷ TODO: Review your existing approach and retool
Copyright © nexB Inc. License: CC-BY-SA-4.0
Key trends (2)
▷ Security is top of mind
● SBOMs are everywhere, but for what? Few can process them
▷ And license compliance is not yet solved
● Still a lot of work left for automation
● Emerging scripting platforms to capture your pipelines
■ Orchestrate many tools
▷ Open data and data sharing will happen
● Everybody wants it, but also everyone wants to control it
● Centralized or decentralized?
Copyright © nexB Inc. License: CC-BY-SA-4.0
Key trends (3)
▷ Software health, quality, sustainability are not yet on the radar
▷ FOSS GUI/Web apps are still badly missing
▷ Slowly the analysis of builds and binaries will displace source-only
scans
▷ Dependency tracking is not yet solved at scale
Copyright © nexB Inc. License: CC-BY-SA-4.0
Key trends (4) Best tools are FOSS
▷ The leading tools are mostly FOSS first
● License detection
● Container analysis
● Package detection
● Dependency tracking and resolution
▷ But BEWARE
● Lots of tools are shallow and look only skin deep
■ Barely suitable for serious license or security work
● Do your homework and try the tools: they are open after all
Copyright © nexB Inc. License: CC-BY-SA-4.0
▷ Vulnerability and package databases are the new rush
● Open or commercial vulnerability databases with supposedly
"premium" content
● But BEWARE of the data quality. Size DOES NOT matter.
■ Made up packages, made up versions
■ Not worth their price: Compare and include open solutions!
▷ Every commercial tool now includes license data
● License data derived from package manifest is NOT ENOUGH
● Built-in policies are impractical: is GPL always bad??
Key trends (5) Poor data quality
Copyright © nexB Inc. License: CC-BY-SA-4.0
PURL is emerging as the glue to avoid lock-in!
● Started to support package ids in ScanCode and VulnerableCode, now everywhere
○ CycloneDX
○ SPDX including just released GitHub SPDX SBOMs features
○ Google OSV
○ Sonatype OSSIndex
○ New PurlDB, MatchCode
○ Most FOSS tools such as ORT, Fosslight, DependencyTrack, Anchore, Tern and
most of the open (and prioprietary) SCA and Infosec/Appsec tools
● Coming to the NVD in version 5.1!!
● Key vector for interop: if two tools speak PURL, integration is made easier
● Demand its adoption by your vendors and projects
Key trends (6) PURL is the essential glue
Copyright © nexB Inc. License: CC-BY-SA-4.0
Key insights (1): Share the data!
"I would like to have automation to avoid repeat work when re-running tools"
"Let's avoid re-running scans, share them and reuse them instead"
● Everyone wants to share and reuse data from scans, and origin and license data
○ Speed up origin and license review
○ Avoid redoing the scans and the same review either inside my org or across orgs
● But "It is hard to overcome lawyers’ objections to sharing data such as license conclusions
and curations"
● And how to trust the scans and curations? And deal with different policies and
standards for conclusions and curations? (specifically about licensing)
● What is the motivation and ease for public data sharing?
Copyright © nexB Inc. License: CC-BY-SA-4.0
Key insights (2): Open the data!
● Open data (e.g., as in free and open licensed data on FOSS) are emerging
○ The too big to share argument will not hold
● Eventually open, community curated FOSS package "knowledge bases" will become
the norm and supplant proprietary, closed source alternatives
● We should share raw scanners/tools outputs first
● We should fix upstream licensing issues, upstream
● The centralized approach does not work well
○ Too big to share
○ Out of date
○ Lack of trust in centralized control
Copyright © nexB Inc. License: CC-BY-SA-4.0
License and Vulnerability are like oil and vinegar
● Even if core process is code origin determination, constituents are not the same (yet)
○ License folks care less about Vulnerabilities
○ Security folks care less about Licenses
● FOSS projects that cater to both should provide differentiated documentation for
each audience
● Some core tools are the same, but users are different
● Expect a convergence of the two aspects in the future
● Until then, advice to OSPOs:
○ Handle both domains
○ But adapt your language to each constituent/persona
Key insights (3) Licensing != Security?
Copyright © nexB Inc. License: CC-BY-SA-4.0
Multiple FOSS projects try to solve license compatibility
● FLICT, OSADL, Hermine Oniro
● Automating license conflicts/compatibility checks is a real problem at scale
● Projects may work together and eventually some conventions will emerge
● Key domains
○ Help legal understand/zoom in on key license concerns
○ What is the effect of multiple licenses?
○ How to surface license compatibility issues
● Effective/resulting license inference and compatibility is a policy issue
○ But tooling can automate the grunt work
Key insights (4) License Compatibility
Copyright © nexB Inc. License: CC-BY-SA-4.0
● Does copying a snippet of code really matter?
○ Have you looked at the big rocks first? e.g., whole libraries
○ Are you ready to pay the price in time and/or cash?
Image credits: https://www.integrativenutrition.com/
Key insights (5) Snippets and matching?
Copyright © nexB Inc. License: CC-BY-SA-4.0
● Domain has been abandoned by commercial vendors
○ Snyk has spun off FOSSID
○ Synopsys mostly abandoned Protex
● One new entrant with open source code but proprietary data: SCANOSS
● Snippets may not matter (too much)
● But AI/ML-generated code snippets anyone?
○ Will Artificial general intelligence (AGI) make snippets both more relevant and
useless at the same time when everyone can generate the same boilerplate
derived from everyone's code
● Yet code matching can speed up the analysis when done right (find big rocks first)
○ Reuse previous analysis based on matching code: WIP with MatchCode
Key insights (5) Snippets and matching?
Copyright © nexB Inc. License: CC-BY-SA-4.0
● SBOMs are everywhere
○ GitHub can even create these directly from a repo
○ But what about data quality (depth and breadth)?
○ But what about using proper machine readable identifiers (license, PURL)?
● Hi-Fi or Lo-Fi SBOMs?
● Every tool creates SBOMs but then what?
○ 2 out of 50+ folks were effectively consuming SBOMs
● Big gaps in tool-to-tool integration
● Too much over engineering, and under-specification
● Advice: Ignore the SPDX vs. CycloneDX feud and embrace both, with PURL
○ Feel free to ignore SWID
○ SBOM is just a reporting format
Key insights (6) SBOM, mehBOM?
Copyright © nexB Inc. License: CC-BY-SA-4.0
● Collaborate: License conflict/compatibility checking FOSS projects on data
and standards (FLIct/OSADl/Hermie)
● Create: A live inventory of all FOSS tools and their capabilities
● Share: Approaches to dependency detection/resolution/processing
● Define: Evolve a standard/schema for tool-to-tool technical scan data sharing
● DATA: Exchange data!
Follow up on collaboration opportunities?
Copyright © nexB Inc. License: CC-BY-SA-4.0
Credits
▷ Presentation template by SlidesCarnival licensed under CC-BY-4.0
▷ Photograph by Unsplash licensed under Unsplash License
▷ Other content licensed under CC-BY-SA-4.0
18

More Related Content

PDF
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
PDF
OpenChain Webinar - AboutCode - Practical Compliance in One Stack – Licensing...
PDF
OpenChain Mini-Summit 2023 - State of Tooling in Open Source Automation
PPTX
VulnTotal: Cross-validate vulnerability coverage of VulnerableCode
PPTX
OpenChain Webinar - Implementing OpenChain ISO/IEC 5230 at endjin + Further R...
PPTX
Contemporary software TRENDS SOFTWARE TRENDS
PDF
Open source software governance with DejaCode
PPT
Managing Software Inventories & Automating Open Source Software Compliance
OpenChain Webinar: AboutCode and Beyond - End-to-End SCA
OpenChain Webinar - AboutCode - Practical Compliance in One Stack – Licensing...
OpenChain Mini-Summit 2023 - State of Tooling in Open Source Automation
VulnTotal: Cross-validate vulnerability coverage of VulnerableCode
OpenChain Webinar - Implementing OpenChain ISO/IEC 5230 at endjin + Further R...
Contemporary software TRENDS SOFTWARE TRENDS
Open source software governance with DejaCode
Managing Software Inventories & Automating Open Source Software Compliance

Similar to “State of the Tooling” in Open Source Automation (20)

PPT
Understanding the Meaningful Use of Open Source Software
PPTX
VulnerableCode: Finding FOSS software vulnerabilities with FOSS tools
PPT
Open Source & Open Development
PDF
Identifying third party software with ScanCode
PDF
Introduction to License Compliance and My research (D. German)
PDF
nexB - Software audit for product release
PPTX
Open Source Software: What Are Your Obligations?
PPTX
Rightsizing Open Source Software Identification
PDF
FASTEN presentation at OSS2021, by Michele Scarlato, Endocode, May 12, 2021, ...
PPTX
FAIR Software (and Data) Citation: Europe, Research Object Systems, Networks ...
PPTX
Social Code Scanning
PDF
Riscoss convention ossmetera.bagnato
PDF
Nurturing the Software Ecosystems of the Future
PPTX
A Vulnerability Database Should Not Be About Vulnerabilities!
PDF
1802_Crossminer_OCF2018
PDF
The Open-Source Monitoring Landscape
PDF
The Open-Source Monitoring Landscape
PDF
Open Source In Enterprises Apache2009 Beijing Jack Cai
PDF
What’s Driving Open Source (for MyGOSSCon)
PPTX
NSGIC 2011 Presentation on geo open source
Understanding the Meaningful Use of Open Source Software
VulnerableCode: Finding FOSS software vulnerabilities with FOSS tools
Open Source & Open Development
Identifying third party software with ScanCode
Introduction to License Compliance and My research (D. German)
nexB - Software audit for product release
Open Source Software: What Are Your Obligations?
Rightsizing Open Source Software Identification
FASTEN presentation at OSS2021, by Michele Scarlato, Endocode, May 12, 2021, ...
FAIR Software (and Data) Citation: Europe, Research Object Systems, Networks ...
Social Code Scanning
Riscoss convention ossmetera.bagnato
Nurturing the Software Ecosystems of the Future
A Vulnerability Database Should Not Be About Vulnerabilities!
1802_Crossminer_OCF2018
The Open-Source Monitoring Landscape
The Open-Source Monitoring Landscape
Open Source In Enterprises Apache2009 Beijing Jack Cai
What’s Driving Open Source (for MyGOSSCon)
NSGIC 2011 Presentation on geo open source
Ad

More from Shane Coughlan (20)

PPTX
Operations Profile SPDX_Update_20250711_Example_05_03.pptx
PDF
The 3rd OSPO Summit - China (Beijing - 2025-06-12)
PPTX
OpenChain Korea Work Group Meeting - 2025-06-16
PPTX
OpenChain Tooling Work Group - 2025-07-02
PPTX
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
PPTX
In From the Cold: Open Source as Part of Mainstream Software Asset Management
PPTX
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
PDF
Open Chain Q2 Steering Committee Meeting - 2025-06-25
PPTX
OpenChain China Work Group – Regular Meeting 3 – 2024-11-29 @ 14:00 to 17:30
PPTX
OpenChain @ InnerSource Summit 2024 - 2024-11-20
PPTX
OpenChain Korea Work Group Meeting #24 - 2024-11-26
PDF
Compliance and Integrity in the Software Supply Chain with Software Heritage:...
PDF
Fujitsu’s OSS standards conformance and AI Management System Standardization ...
PPTX
OpenChain China Work Group Presentation @ OSCAR 2024
PPTX
OpenChain Japan Community Day - 2024-10-17
PPTX
ETRI EOST2024 Seoul Keynote - 2024-10-15
PDF
OpenChain Webinar- The Role of Data in the Supply Chain of AI - 2024-10-10
PDF
SBOM Implementation Reality - From Crawl to Walk, the SPDX Lite Profile for t...
PPTX
OpenChain Webinar - AI Legal Landscape - Slides
PDF
OpenChain Telco SBOM Guide Overview - 2024-09-25
Operations Profile SPDX_Update_20250711_Example_05_03.pptx
The 3rd OSPO Summit - China (Beijing - 2025-06-12)
OpenChain Korea Work Group Meeting - 2025-06-16
OpenChain Tooling Work Group - 2025-07-02
OpenChain @ OSS NA - In From the Cold: Open Source as Part of Mainstream Soft...
In From the Cold: Open Source as Part of Mainstream Software Asset Management
Empowering Asian Contributions: The Rise of Regional User Groups in Open Sour...
Open Chain Q2 Steering Committee Meeting - 2025-06-25
OpenChain China Work Group – Regular Meeting 3 – 2024-11-29 @ 14:00 to 17:30
OpenChain @ InnerSource Summit 2024 - 2024-11-20
OpenChain Korea Work Group Meeting #24 - 2024-11-26
Compliance and Integrity in the Software Supply Chain with Software Heritage:...
Fujitsu’s OSS standards conformance and AI Management System Standardization ...
OpenChain China Work Group Presentation @ OSCAR 2024
OpenChain Japan Community Day - 2024-10-17
ETRI EOST2024 Seoul Keynote - 2024-10-15
OpenChain Webinar- The Role of Data in the Supply Chain of AI - 2024-10-10
SBOM Implementation Reality - From Crawl to Walk, the SPDX Lite Profile for t...
OpenChain Webinar - AI Legal Landscape - Slides
OpenChain Telco SBOM Guide Overview - 2024-09-25
Ad

Recently uploaded (20)

PDF
System and Network Administraation Chapter 3
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PPTX
Odoo POS Development Services by CandidRoot Solutions
PPTX
Introduction to Artificial Intelligence
PDF
Digital Strategies for Manufacturing Companies
PPTX
history of c programming in notes for students .pptx
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
L1 - Introduction to python Backend.pptx
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
medical staffing services at VALiNTRY
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Softaken Excel to vCard Converter Software.pdf
System and Network Administraation Chapter 3
Design an Analysis of Algorithms II-SECS-1021-03
Navsoft: AI-Powered Business Solutions & Custom Software Development
How to Migrate SBCGlobal Email to Yahoo Easily
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Odoo POS Development Services by CandidRoot Solutions
Introduction to Artificial Intelligence
Digital Strategies for Manufacturing Companies
history of c programming in notes for students .pptx
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
Upgrade and Innovation Strategies for SAP ERP Customers
L1 - Introduction to python Backend.pptx
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
medical staffing services at VALiNTRY
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Odoo Companies in India – Driving Business Transformation.pdf
PTS Company Brochure 2025 (1).pdf.......
Design an Analysis of Algorithms I-SECS-1021-03
Softaken Excel to vCard Converter Software.pdf

“State of the Tooling” in Open Source Automation

  • 1. Copyright © nexB Inc. License: CC-BY-SA-4.0 “State of the Tooling” in Open Source Automation OpenChain German work group Philippe Ombredanne, AboutCode.org nexB Inc.
  • 2. Copyright © nexB Inc. License: CC-BY-SA-4.0 Philippe Ombredanne ► Project lead and maintainer for VulnerableCode, ScanCode and AboutCode ► Creator of Package URL, co-founder of SPDX & ClearlyDefined ► FOSS veteran, long time Google Summer of Code mentor ► Co-founder and CTO of nexB Inc., makers of DejaCode ► Weird facts and claims to fame ● Signed off on the largest deletion of lines of code in the Linux kernel (but these were only comments) ● Unrepentant code hoarder. Had 60,000+ GH forks now down only to 20K forks ► pombredanne@nexb.com irc:pombreda
  • 3. Copyright © nexB Inc. License: CC-BY-SA-4.0 Why open source compliance tooling? ▷ Because open source for open source: This is the way! ● Dogfooding ▷ Free as in beer and freedom of course ● Code of course, but do not forget the data! ▷ Key to enable right-sized automation for your open chain ▷ Best-in-class tools in several areas
  • 4. Copyright © nexB Inc. License: CC-BY-SA-4.0 Key trends (1) Time to retool? ▷ 3rd wave of Compliance tooling creation and adoption underway ● 1st wave was commercial ● 2nd wave was centered on license compliance and legal ● 3rd wave will be centered on developers and appsec ■ Eventually balanced and holistic FOSS solutions ▷ TODO: Review your existing approach and retool
  • 5. Copyright © nexB Inc. License: CC-BY-SA-4.0 Key trends (2) ▷ Security is top of mind ● SBOMs are everywhere, but for what? Few can process them ▷ And license compliance is not yet solved ● Still a lot of work left for automation ● Emerging scripting platforms to capture your pipelines ■ Orchestrate many tools ▷ Open data and data sharing will happen ● Everybody wants it, but also everyone wants to control it ● Centralized or decentralized?
  • 6. Copyright © nexB Inc. License: CC-BY-SA-4.0 Key trends (3) ▷ Software health, quality, sustainability are not yet on the radar ▷ FOSS GUI/Web apps are still badly missing ▷ Slowly the analysis of builds and binaries will displace source-only scans ▷ Dependency tracking is not yet solved at scale
  • 7. Copyright © nexB Inc. License: CC-BY-SA-4.0 Key trends (4) Best tools are FOSS ▷ The leading tools are mostly FOSS first ● License detection ● Container analysis ● Package detection ● Dependency tracking and resolution ▷ But BEWARE ● Lots of tools are shallow and look only skin deep ■ Barely suitable for serious license or security work ● Do your homework and try the tools: they are open after all
  • 8. Copyright © nexB Inc. License: CC-BY-SA-4.0 ▷ Vulnerability and package databases are the new rush ● Open or commercial vulnerability databases with supposedly "premium" content ● But BEWARE of the data quality. Size DOES NOT matter. ■ Made up packages, made up versions ■ Not worth their price: Compare and include open solutions! ▷ Every commercial tool now includes license data ● License data derived from package manifest is NOT ENOUGH ● Built-in policies are impractical: is GPL always bad?? Key trends (5) Poor data quality
  • 9. Copyright © nexB Inc. License: CC-BY-SA-4.0 PURL is emerging as the glue to avoid lock-in! ● Started to support package ids in ScanCode and VulnerableCode, now everywhere ○ CycloneDX ○ SPDX including just released GitHub SPDX SBOMs features ○ Google OSV ○ Sonatype OSSIndex ○ New PurlDB, MatchCode ○ Most FOSS tools such as ORT, Fosslight, DependencyTrack, Anchore, Tern and most of the open (and prioprietary) SCA and Infosec/Appsec tools ● Coming to the NVD in version 5.1!! ● Key vector for interop: if two tools speak PURL, integration is made easier ● Demand its adoption by your vendors and projects Key trends (6) PURL is the essential glue
  • 10. Copyright © nexB Inc. License: CC-BY-SA-4.0 Key insights (1): Share the data! "I would like to have automation to avoid repeat work when re-running tools" "Let's avoid re-running scans, share them and reuse them instead" ● Everyone wants to share and reuse data from scans, and origin and license data ○ Speed up origin and license review ○ Avoid redoing the scans and the same review either inside my org or across orgs ● But "It is hard to overcome lawyers’ objections to sharing data such as license conclusions and curations" ● And how to trust the scans and curations? And deal with different policies and standards for conclusions and curations? (specifically about licensing) ● What is the motivation and ease for public data sharing?
  • 11. Copyright © nexB Inc. License: CC-BY-SA-4.0 Key insights (2): Open the data! ● Open data (e.g., as in free and open licensed data on FOSS) are emerging ○ The too big to share argument will not hold ● Eventually open, community curated FOSS package "knowledge bases" will become the norm and supplant proprietary, closed source alternatives ● We should share raw scanners/tools outputs first ● We should fix upstream licensing issues, upstream ● The centralized approach does not work well ○ Too big to share ○ Out of date ○ Lack of trust in centralized control
  • 12. Copyright © nexB Inc. License: CC-BY-SA-4.0 License and Vulnerability are like oil and vinegar ● Even if core process is code origin determination, constituents are not the same (yet) ○ License folks care less about Vulnerabilities ○ Security folks care less about Licenses ● FOSS projects that cater to both should provide differentiated documentation for each audience ● Some core tools are the same, but users are different ● Expect a convergence of the two aspects in the future ● Until then, advice to OSPOs: ○ Handle both domains ○ But adapt your language to each constituent/persona Key insights (3) Licensing != Security?
  • 13. Copyright © nexB Inc. License: CC-BY-SA-4.0 Multiple FOSS projects try to solve license compatibility ● FLICT, OSADL, Hermine Oniro ● Automating license conflicts/compatibility checks is a real problem at scale ● Projects may work together and eventually some conventions will emerge ● Key domains ○ Help legal understand/zoom in on key license concerns ○ What is the effect of multiple licenses? ○ How to surface license compatibility issues ● Effective/resulting license inference and compatibility is a policy issue ○ But tooling can automate the grunt work Key insights (4) License Compatibility
  • 14. Copyright © nexB Inc. License: CC-BY-SA-4.0 ● Does copying a snippet of code really matter? ○ Have you looked at the big rocks first? e.g., whole libraries ○ Are you ready to pay the price in time and/or cash? Image credits: https://www.integrativenutrition.com/ Key insights (5) Snippets and matching?
  • 15. Copyright © nexB Inc. License: CC-BY-SA-4.0 ● Domain has been abandoned by commercial vendors ○ Snyk has spun off FOSSID ○ Synopsys mostly abandoned Protex ● One new entrant with open source code but proprietary data: SCANOSS ● Snippets may not matter (too much) ● But AI/ML-generated code snippets anyone? ○ Will Artificial general intelligence (AGI) make snippets both more relevant and useless at the same time when everyone can generate the same boilerplate derived from everyone's code ● Yet code matching can speed up the analysis when done right (find big rocks first) ○ Reuse previous analysis based on matching code: WIP with MatchCode Key insights (5) Snippets and matching?
  • 16. Copyright © nexB Inc. License: CC-BY-SA-4.0 ● SBOMs are everywhere ○ GitHub can even create these directly from a repo ○ But what about data quality (depth and breadth)? ○ But what about using proper machine readable identifiers (license, PURL)? ● Hi-Fi or Lo-Fi SBOMs? ● Every tool creates SBOMs but then what? ○ 2 out of 50+ folks were effectively consuming SBOMs ● Big gaps in tool-to-tool integration ● Too much over engineering, and under-specification ● Advice: Ignore the SPDX vs. CycloneDX feud and embrace both, with PURL ○ Feel free to ignore SWID ○ SBOM is just a reporting format Key insights (6) SBOM, mehBOM?
  • 17. Copyright © nexB Inc. License: CC-BY-SA-4.0 ● Collaborate: License conflict/compatibility checking FOSS projects on data and standards (FLIct/OSADl/Hermie) ● Create: A live inventory of all FOSS tools and their capabilities ● Share: Approaches to dependency detection/resolution/processing ● Define: Evolve a standard/schema for tool-to-tool technical scan data sharing ● DATA: Exchange data! Follow up on collaboration opportunities?
  • 18. Copyright © nexB Inc. License: CC-BY-SA-4.0 Credits ▷ Presentation template by SlidesCarnival licensed under CC-BY-4.0 ▷ Photograph by Unsplash licensed under Unsplash License ▷ Other content licensed under CC-BY-SA-4.0 18