blog/source/_posts/secure-node-modules-snyk.md

4.9 KiB
Raw Blame History

title date lastUpdated tags
Secure node modules with Snyk 2018-10-01 00:00:00 2018-10-30 00:00:00

Intro

Click here to go straight to installation guide.

Node.js is infamous for the left-pad controversy, removing just a single package can break many websites.

The package dependency can also cause security issue (example 1, example 2).

Say you use Package A, which depends on Package B, which depends on Package C and so on.

A > B > C > D > E

What if Package A uses outdated version of Package B?

If newer version(s) of Package A has updated its package.json to use updated version of Package B, you simply update your package.json to update Package A.

What if Package A is no longer maintained? You can fork its repo, update the package and re-publish under a new name. For example, hexo-autonofollow uses vulnerable version of cheerio, hexo-filter-nofollow updates it.

If you have time to fork and more importantly fix any compatibility issue (example), why not?

Now, what if E is vulnerable? For example, hexo-fs package has a vulnerability introduced by chownr package. The dependency path is hexo-fs@0.2.3 chokidar@1.7.0 fsevents@1.2.4 node-pre-gyp@0.10.3 tar@4.4.6 chownr@1.1.1.

So, you fork, fix it and republish with a new name. Cool. Here comes the fun part, you also need to instruct tar to go for the renamed package. Fork, fix and republish. Repeat this for all the packages along the path.

Installation

Practically, you can use Snyk to patch it, if possible like this hexo-all-minifier. Snyk is free for open-source projects. Much like any other security products, Snyk is not a silver bullet to the NodeJS issue. Some like hexo-fs can't be fixed (at the time of writing).

  1. Sign up for a new Snyk account.
  2. Snyk only supports SSO, no e-mail sign up. You need to have GitHub, Bitbucket, or Google account. It can be a separate account from your current GitHub account. Linking your current GitHub repo to Snyk is optional.
  3. Once you signed up, go to your account setting, grab the API token and save it in your password manager (or somewhere safe). {% cloudinary 20181001/snyk-api.png %}
  4. Install Snyk, $ sudo npm install -g snyk.
  5. cd into your repo folder.
  6. Login to Snyk, $ snyk auth. Snyk website will pop-up.
  7. Once authenticated, you can start to use it.
  8. Test for vulnerability, $ snyk test.
  9. If there is any vulnerability, run $ snyk wizard.
  10. Snyk will prompt you for a possible action (update, patch or ignore).
  11. Snyk will ask if you want to add its commands to package.json. This allows Snyk to check every time you $ npm install. I don't add it because it doesn't play nice with CI.
  12. .snyk file will be created. You can review it in a text editor.
  13. If fix is available, run $ snyk protect.
  14. In step 10, if you choose to ignore, Snyk will ignore the issue for 30 days by default (even after you run snyk test. Once elapsed, $ snyk test will say there is vulnerability again (and fail your build/CI). If you find it annoying, you can delay the expiry date in .snyk.
  15. Lastly, link the project to your Snyk account, $ snyk monitor. Your project will shows up at your Snyk account. Go to the project setting and add your github repo link. This is necessary to remove usage quota for open-source projects.
  16. Optional: add snyk test, snyk protect and snyk monitor commands to your CI script to protect your CI build image.

Attention: Snyk depends on GNU version of patch utility, so you need to install it if the CI build environment is Alpine or BSD. Otherwise, snyk protect won't work. Read my newer post for more info.

Alternatively, you could integrate directly to your remote repo (github/gitlab). This integration allows Snyk to automatically create pull/merge request. Enable this by going to your Snyk account and Integrations tab.

{% cloudinary 20181001/snyk-integration.png %}

More info: NodeJS, GitHub, GitLab