Skip to content

Commit bed2b18

Browse files
authored
Merge pull request #205 from CPAN-Security/gpw2026-talks-sjn
gpw2026 talk slides from sjn
2 parents 1b6c82e + bf106c1 commit bed2b18

File tree

254 files changed

+21879
-2
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

254 files changed

+21879
-2
lines changed

presentations/'

Lines changed: 417 additions & 0 deletions
Large diffs are not rendered by default.

presentations/.python-version

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1 @@
1+
3.9.17

presentations/Makefile

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
all: tprc2023-cpan-sec-lightning-talk/index.html perlkohacon-cpan-sec-lightning-talk/index.html pts2023-nis2-cra-intro/index.html perlkohacon-cpan-sbom-talk/index.html fosdem2024-cpan-sec-talk/index.html fosdem2024-sbom-in-open-source-ecosystems-talk/index.html pts2024-cra-update/index.html lpw2024-metadata-cpan-foss-cra/index.html nuug2024-metadata-foss-cra/index.html fosdem2025-where-do-sbom-attributes-come-from/index.html gpw2025-cpan-security-sustainability/index.html gpw2025-metadata-clapalong/index.html lpw2025-cpansec-update/index.html
1+
all: tprc2023-cpan-sec-lightning-talk/index.html perlkohacon-cpan-sec-lightning-talk/index.html pts2023-nis2-cra-intro/index.html perlkohacon-cpan-sbom-talk/index.html fosdem2024-cpan-sec-talk/index.html fosdem2024-sbom-in-open-source-ecosystems-talk/index.html pts2024-cra-update/index.html lpw2024-metadata-cpan-foss-cra/index.html nuug2024-metadata-foss-cra/index.html fosdem2025-where-do-sbom-attributes-come-from/index.html gpw2025-cpan-security-sustainability/index.html gpw2025-metadata-clapalong/index.html lpw2025-cpansec-update/index.html gpw2026-steward-proposal/index.html gpw2026-cpansec-update/index.html
22

33

44
tprc2023-cpan-sec-lightning-talk/index.html: tprc2023-cpan-sec-lightning-talk.md
@@ -39,3 +39,10 @@ gpw2025-metadata-clapalong/index.html: gpw2025-metadata-clapalong.md
3939

4040
lpw2025-cpansec-update/index.html: lpw2025-cpansec-update.md
4141
mdslides lpw2025-cpansec-update.md --include ../media
42+
43+
gpw2026-steward-proposal/index.html: gpw2026-steward-proposal.md
44+
mdslides gpw2026-steward-proposal.md --include ../media
45+
46+
gpw2026-cpansec-update/index.html: gpw2026-cpansec-update.md
47+
mdslides gpw2026-cpansec-update.md --include ../media
48+

presentations/README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,4 +19,6 @@ This directory contains presentations relevant to CPANSec given at conferences a
1919
* FOSDEM 2025 ([Software Bill of Materials devroom](https://fosdem.org/2025/schedule/track/sbom/)) — [Where in the OSS Supply Chain do SBOM attributes come from?](https://fosdem.org/2025/schedule/event/fosdem-2025-6483-where-in-the-oss-supply-chain-do-sbom-attributes-come-from-/) ([Slides](fosdem2025-where-do-sbom-attributes-come-from/), [Video](https://fosdem.org/2025/schedule/event/fosdem-2025-6483-where-in-the-oss-supply-chain-do-sbom-attributes-come-from-/))
2020
* German Perl Workshop 2025 — [CPAN Security and Sustainability in light of the EU Cyber Resilience Act](https://act.yapc.eu/gpw2025/talk/7956) ([Slides](gpw2025-cpan-security-sustainability/))
2121
* German Perl Workshop 2025 — Metadata Clapalong 👏 (Lightning talk, [Slides](gpw2025-metadata-clapalong/))
22-
* London Perl Workshop 2025 - An update on CPANSec (Lightning talk, [Slides](lpw2025-cpansec-update/))
22+
* London Perl Workshop 2025 — An update on CPANSec (Lightning talk, [Slides](lpw2025-cpansec-update/))
23+
* German Perl Workshop 2026 — [What might a CPAN Steward organization look like?](https://act.yapc.eu/gpw2026/talk/8037) ([Slides](gpw2026-steward-proposal/), Video)
24+
* German Perl Workshop 2026 — An update on CPANSec (Lightning talk, ([Slides](gpw2026-cpansec-update/))
Lines changed: 253 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,253 @@
1+
[comment]: # (Compile this presentation with the command below)
2+
[comment]: # (mdslides lpw2025-cpansec-update.md --include ../media)
3+
[comment]: # (...or by running the Makefile with "make")
4+
[comment]: # (mdslides can be installed from https://github.com/dadoomer/markdown-slides/)
5+
6+
[comment]: # (THEME = solarized)
7+
8+
[comment]: # (minScale: 0.2)
9+
[comment]: # (maxScale: 4.0)
10+
[comment]: # (controls: true)
11+
[comment]: # (width: "960")
12+
[comment]: # (height: "700")
13+
[comment]: # (help: true)
14+
[comment]: # (progress: true)
15+
[comment]: # (controlsBackArrows: "true")
16+
17+
# An update on CPANSec
18+
19+
Salve J. Nilsen
20+
21+
@sjn@chaos.social
22+
23+
Note:
24+
25+
Hei! I'm <NAME> and I'm here to introduce the CPAN Security Working Group to you
26+
27+
[comment]: # (!!!)
28+
29+
## What?
30+
31+
* Est. at **Perl Toolchain Summit** 2023 in Lyon 🇫🇷
32+
* We work on & care for **Security on CPAN**
33+
* We are [the CVE Numbering Authority for Perl and CPAN][cna]
34+
35+
We've published [68 CVEs](https://lists.security.metacpan.org/cve-announce/)
36+
37+
[cna]: https://security.metacpan.org/2025/02/25/cpansec-is-cna-for-perl-and-cpan.html
38+
39+
Note:
40+
41+
Established in April 2023 year at the Perl Toolchain Summit in Lyon, France
42+
43+
[comment]: # (!!!)
44+
45+
## In-Scope Security Topics
46+
47+
Note:
48+
49+
Here are some of the things we care about!
50+
51+
[comment]: # (|||)
52+
53+
### Security Outreach & Information
54+
55+
👉 Facilitating **responsible/coordinated disclosure** between authors, reporters and users.
56+
57+
Note:
58+
59+
Keep different information channels (websites, social media) up-to-date and relevant with info on incidents, best practices and other documentation.
60+
61+
VINCE – Vulnerability Information and Coordination Environment
62+
63+
Topics not under embargo are discussed on IRC
64+
65+
[comment]: # (|||)
66+
67+
### Vulnerability Index
68+
69+
👉 **Audit** and track vulnerabilities
70+
71+
Note:
72+
73+
Improve security awareness by standardizing and publishing CPAN package vulnerabilities in relevant indices (our own, or CVE, or other).
74+
75+
[comment]: # (|||)
76+
77+
### Provenance & Supply Chain Security
78+
79+
👉 Establish secure CPAN downloads
80+
81+
* Secure-by-default CPAN clients
82+
* [The Update Framework][tuf] on CPAN
83+
84+
[tuf]: https://theupdateframework.io/
85+
86+
Note:
87+
88+
* TLS support in all CPAN clients
89+
* CPAN.pm, cpanm, etc.
90+
91+
* Implement [The Update Framework][tuf] in CPAN
92+
* Repository signatures ("is this from CPAN?")
93+
* Author signatures ("is this from AUTHOR?")
94+
95+
[tuf]: https://theupdateframework.io/
96+
97+
We want to make TLS in cpan clients on by default, with cert verification on
98+
99+
Looking at getting The Update Framework (pypi has some implementation of this) as a supported, this is in addition to TLS
100+
101+
The TUF spec supports repo and author signing
102+
103+
TUF mitigates attacks that the current PGP signed CHECKSUMS implementation is vulnerable to, like replay attacks and downgrade attacks,
104+
105+
[comment]: # (|||)
106+
107+
### Metadata & Software Bills of Materials
108+
109+
👉 **SBOM** creation and verification
110+
111+
* For compliance with the [Cyber Resilience Act][cra]
112+
113+
[cra]: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:L_202402847
114+
115+
Note:
116+
117+
* CPAN PackageURL in spec 🚧
118+
* PackageURL-enabled CPAN tooling
119+
* SBOM-enabled CPAN tooling
120+
121+
Support risk analysis and management by writing tooling for managing standard SBOM objects like OWASP CycloneDX or SPDX, and do this by using existing and new CPAN metadata.
122+
123+
Improve interoperability with non-CPAN package indices
124+
125+
[comment]: # (|||)
126+
127+
### Transparency Logs
128+
129+
👉 Tooling for **third-party monitoring** of&nbsp;package&nbsp;changes
130+
131+
Note:
132+
133+
* Sigstore for CPAN
134+
135+
Write tooling for monitoring package updates and integrity checking of metadata using tools like `sigstore` or `sigsum`, or take inspiration from `transparency.dev`.
136+
137+
[comment]: # (|||)
138+
139+
### Security Patch Tooling
140+
141+
👉 Apply high-priority security patches on CPAN
142+
143+
Note:
144+
145+
Enable high-priority updates of CPAN packages, by developing tooling for publishing and applying third-party security patches to CPAN distributions with non-responsive authors.
146+
147+
[comment]: # (|||)
148+
149+
### Privacy and Compliance
150+
151+
👉 Inform on relevant regulations and compliance
152+
153+
* We maintain a growing [reading list]
154+
155+
[reading list]: https://security.metacpan.org/docs/readinglist.html
156+
157+
Note:
158+
159+
Still lots to do!
160+
161+
[comment]: # (|||)
162+
163+
### Software Composition Analysis
164+
165+
👉 Promote and create tooling for detecting known vulnerabilities
166+
167+
Note:
168+
169+
* Analyze dependencies for known vulnerabilities
170+
171+
[comment]: # (|||)
172+
173+
### Governance, Policy & Funding
174+
175+
👉 Rules and funding channels for sustainable security work
176+
177+
Note:
178+
179+
* Pre-Release Disclosure Agreement
180+
* Charter 🚧
181+
* CPAN Supply chain overview 🚧
182+
183+
* Establish constructive rules, playbooks, governance, policy, and funding channels for security work that is needed.
184+
185+
[comment]: # (|||)
186+
187+
### And more!
188+
189+
👉The security landscape is evolving, so must CPAN!
190+
191+
* Perl and CPAN is in use **everywhere**
192+
* New security demands from market authorities and others
193+
194+
Note:
195+
196+
And more!
197+
198+
Let's have an organization in place that can help improve our security landscape as we discover new vulnerabilities and issues!
199+
Sometimes, response time is of the essence, and that means someone has to be there to respond.
200+
201+
Interoperability – Perl and CPAN is part of a larger Open Source landscape!
202+
203+
[comment]: # (|||)
204+
205+
### Join us!
206+
207+
Do you…
208+
209+
* …work with & **care about security**?
210+
* …have **spare tuits**?
211+
* …have a **security commons** aware employer?
212+
* …enjoy getting your **ducks in a row**? 🦆🦆🦆
213+
214+
Note:
215+
216+
* Do you have a **security background** or care about the Toolchain?
217+
* Do you have **time to volunteer**?
218+
* Is your employer willing to **dedicate a percentage of your time** to improve our security commons?
219+
220+
We need volunteers!
221+
222+
[comment]: # (!!!)
223+
224+
### Find us!
225+
226+
https://security.metacpan.org/
227+
228+
[https://matrix.to/#/#cpansec-discussion:matrix.org](https://matrix.to/#/#cpansec-discussion:matrix.org)
229+
230+
[https://fosstodon.org/@cpansec](https://fosstodon.org/@cpansec)
231+
232+
[ircs://ssl.irc.perl.org:7062/#cpan-security](ircs://ssl.irc.perl.org:7062/#cpan-security)
233+
234+
235+
mailto:cpan-security@security.metacpan.org
236+
237+
Note:
238+
239+
We're on the web, Matrix, Mastodon, IRC, BlueSky, mail and eventually on other places.
240+
241+
[comment]: # (!!!)
242+
243+
# Thanks!
244+
245+
Come talk to me!
246+
247+
(I've got stickers)
248+
249+
🦆🦆
250+
251+
Note:
252+
253+
Thanks!
Lines changed: 19 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,19 @@
1+
Copyright (C) 2020 Hakim El Hattab, http://hakim.se, and reveal.js contributors
2+
3+
Permission is hereby granted, free of charge, to any person obtaining a copy
4+
of this software and associated documentation files (the "Software"), to deal
5+
in the Software without restriction, including without limitation the rights
6+
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
7+
copies of the Software, and to permit persons to whom the Software is
8+
furnished to do so, subject to the following conditions:
9+
10+
The above copyright notice and this permission notice shall be included in
11+
all copies or substantial portions of the Software.
12+
13+
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
14+
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
15+
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
16+
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
17+
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
18+
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
19+
THE SOFTWARE.
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
/* http://meyerweb.com/eric/tools/css/reset/
2+
v4.0 | 20180602
3+
License: none (public domain)
4+
*/
5+
6+
html, body, div, span, applet, object, iframe,
7+
h1, h2, h3, h4, h5, h6, p, blockquote, pre,
8+
a, abbr, acronym, address, big, cite, code,
9+
del, dfn, em, img, ins, kbd, q, s, samp,
10+
small, strike, strong, sub, sup, tt, var,
11+
b, u, i, center,
12+
dl, dt, dd, ol, ul, li,
13+
fieldset, form, label, legend,
14+
table, caption, tbody, tfoot, thead, tr, th, td,
15+
article, aside, canvas, details, embed,
16+
figure, figcaption, footer, header, hgroup,
17+
main, menu, nav, output, ruby, section, summary,
18+
time, mark, audio, video {
19+
margin: 0;
20+
padding: 0;
21+
border: 0;
22+
font-size: 100%;
23+
font: inherit;
24+
vertical-align: baseline;
25+
}
26+
/* HTML5 display-role reset for older browsers */
27+
article, aside, details, figcaption, figure,
28+
footer, header, hgroup, main, menu, nav, section {
29+
display: block;
30+
}

presentations/gpw2026-cpansec-update/dist/reveal.css

Lines changed: 8 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

presentations/gpw2026-cpansec-update/dist/reveal.esm.js

Lines changed: 9 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

presentations/gpw2026-cpansec-update/dist/reveal.js

Lines changed: 9 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)