You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: TSF/trustable/assertions/TA-ANALYSIS_CONTEXT.md
+3-1Lines changed: 3 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,10 +3,12 @@ level: 1.1
3
3
normative: false
4
4
---
5
5
6
+
(Note: The guidance, evidence, confidence scoring and checklist sections below are copied from [CodeThink's documentation of TSF](https://codethinklabs.gitlab.io/trustable/trustable/trustable/TA.html). However, the answers to each point in the evidence list and checklist are specific to this project.)
7
+
6
8
**Guidance**
7
9
8
10
This assertion is satisfied to the extent that test data, and data collected
9
-
from monitoring of deployed versions of XYZ, has been analysed, and the results
11
+
from monitoring of deployed versions of nlohmann/json, has been analysed, and the results
10
12
used to inform the refinement of Expectations and risk analysis.
11
13
12
14
The extent of the analysis is with sufficient precision to confirm that:
Copy file name to clipboardExpand all lines: TSF/trustable/assertions/TA-BEHAVIOURS_CONTEXT.md
+4-2Lines changed: 4 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,16 +3,18 @@ level: 1.1
3
3
normative: false
4
4
---
5
5
6
+
(Note: The guidance, evidence, confidence scoring and checklist sections below are copied from [CodeThink's documentation of TSF](https://codethinklabs.gitlab.io/trustable/trustable/trustable/TA.html). However, the answers to each point in the evidence list and checklist are specific to this project.)
7
+
6
8
Although it is practically impossible to specify all of the necessary behaviours
7
9
and required properties for complex software, we must clearly specify the most
8
10
important of these (e.g. where harm could result if given criteria are not met),
9
-
and verify that these are correctly provided by XYZ.
11
+
and verify that these are correctly provided by nlohmann/json.
10
12
11
13
**Guidance**
12
14
13
15
This assertion is satisfied to the extent that we have:
14
16
15
-
- Determined which Behaviours are critical for consumers of XYZ and recorded
17
+
- Determined which Behaviours are critical for consumers of nlohmann/json and recorded
Copy file name to clipboardExpand all lines: TSF/trustable/assertions/TA-CONFIDENCE_CONTEXT.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,8 @@ level: 1.1
3
3
normative: false
4
4
---
5
5
6
+
(Note: The guidance, evidence, confidence scoring and checklist sections below are copied from [CodeThink's documentation of TSF](https://codethinklabs.gitlab.io/trustable/trustable/trustable/TA.html). However, the answers to each point in the evidence list and checklist are specific to this project.)
7
+
6
8
**Guidance**
7
9
8
10
To quantify confidence, either a subjective assessment or a statistical argument must be presented for each statement and then systematically and repeatably aggregated to assess whether the final deliverable is fit for purpose.
Copy file name to clipboardExpand all lines: TSF/trustable/assertions/TA-CONSTRAINTS_CONTEXT.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,8 @@ level: 1.1
3
3
normative: false
4
4
---
5
5
6
+
(Note: The guidance, evidence, confidence scoring and checklist sections below are copied from [CodeThink's documentation of TSF](https://codethinklabs.gitlab.io/trustable/trustable/trustable/TA.html). However, the answers to each point in the evidence list and checklist are specific to this project.)
7
+
6
8
**Guidance**
7
9
8
10
Constraints on reuse, reconfiguration, modification, and deployment are
Copy file name to clipboardExpand all lines: TSF/trustable/assertions/TA-DATA_CONTEXT.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,8 @@ level: 1.1
3
3
normative: false
4
4
---
5
5
6
+
(Note: The guidance, evidence, confidence scoring and checklist sections below are copied from [CodeThink's documentation of TSF](https://codethinklabs.gitlab.io/trustable/trustable/trustable/TA.html). However, the answers to each point in the evidence list and checklist are specific to this project.)
7
+
6
8
**Guidance**
7
9
8
10
This assertion is satisfied if results from all tests and monitored deployments are captured accurately, ensuring:
Copy file name to clipboardExpand all lines: TSF/trustable/assertions/TA-FIXES_CONTEXT.md
+19-17Lines changed: 19 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,14 +3,16 @@ level: 1.1
3
3
normative: false
4
4
---
5
5
6
+
(Note: The guidance, evidence, confidence scoring and checklist sections below are copied from [CodeThink's documentation of TSF](https://codethinklabs.gitlab.io/trustable/trustable/trustable/TA.html). However, the answers to each point in the evidence list and checklist are specific to this project.)
7
+
6
8
**Guidance**
7
9
8
-
This assertion is satisfied to the extent that we have identified, triaged, and applied fixes or mitigations to faults in XYZ, as well as to bugs and publicly disclosed vulnerabilities identified in upstream dependencies.
10
+
This assertion is satisfied to the extent that we have identified, triaged, and applied fixes or mitigations to faults in nlohmann/json, as well as to bugs and publicly disclosed vulnerabilities identified in upstream dependencies.
9
11
10
-
Confidence can be improved by assessing known faults, bugs, and vulnerabilities to establish their relevance and impact for XYZ.
12
+
Confidence can be improved by assessing known faults, bugs, and vulnerabilities to establish their relevance and impact for nlohmann/json.
11
13
An important aspect is documenting how issues are discovered and tracked, including identifying additional Misbehaviours (TA-MISBEHAVIOURS) that may require immediate mitigation measures (including recalls), and how such issues are communicated to users.
12
14
13
-
In principle, this analysis should include not only the code in XYZ but also its dependencies (all the way down) and the tools and data used to construct the release.
15
+
In principle, this analysis should include not only the code in nlohmann/json but also its dependencies (all the way down) and the tools and data used to construct the release.
14
16
In practice, however, the cost/benefit of this work must be weighed against:
15
17
16
18
- the volume and quality of available bug and vulnerability reports
@@ -38,26 +40,26 @@ As part of ongoing monitoring, the rate of incoming, resolved, and rejected issu
38
40
- List of outstanding known vulnerabilities still not fixed, with triage/prioritisation based
39
41
on severity/relevance/impact
40
42
-**Answer**: Provided in JLS-30, JLS-33 and AOU-29
41
-
- List of XYZ component versions, showing where a newer version exists upstream
43
+
- List of nlohmann/json component versions, showing where a newer version exists upstream
42
44
-**Answer**: Not relevant since nlohmann/json has no external components, as stated in JLS-34
43
45
- List of component version updates since last release
44
46
-**Answer**: Not relevant as nlohmann/json has no external components, as stated in JLS-34
45
47
- List of fixes applied to developed code since last release
46
48
-**Answer**: Provided in JLS-29
47
49
- List of fixes for developed code that are outstanding, not applied yet
48
50
-**Answer**: Provided in JLS-11
49
-
- List of XYZ faults outstanding (O)
51
+
- List of nlohmann/json faults outstanding (O)
50
52
-**Answer**: Provided in JLS-11
51
-
- List of XYZ faults fixed since last release (F)
53
+
- List of nlohmann/json faults fixed since last release (F)
52
54
-**Answer**: Provided in JLS-29
53
-
- List of XYZ faults mitigated since last release (M)
55
+
- List of nlohmann/json faults mitigated since last release (M)
54
56
-**Answer**: Provided in JLS-29
55
57
56
58
**Confidence scoring**
57
59
58
60
Confidence scoring for TA-FIXES can be based on
59
61
60
-
- some function of [O, F, M] for XYZ
62
+
- some function of [O, F, M] for nlohmann/json
61
63
- number of outstanding relevant bugs from components
62
64
- bug triage results, accounting for undiscovered bugs
63
65
- number of outstanding known vulnerabilities
@@ -70,35 +72,35 @@ Each iteration, we should improve the algorithm based on measurements
70
72
71
73
**Checklist**
72
74
73
-
- How many faults have we identified in XYZ?
74
-
-**Answer**: None that are relevant for S-CORE's use case of the library.
75
+
- How many faults have we identified in nlohmann/json?
76
+
-**Answer**: 58, but none are relevant for S-CORE's use case of the library (see JLS-11).
75
77
- How many unknown faults remain to be found, based on the number that have
76
78
been processed so far?
77
79
-**Answer**: It is unlikely that there are unknown faults relevant to S-CORE.
78
80
- Is there any possibility that people could be motivated to manipulate the
79
81
lists (e.g. bug bonus or pressure to close).
80
-
-**Answer**: Unlikely, since the project is entirely open source.
82
+
-**Answer**: It is unlikely that people would be motivated to manipulate the lists in nlohmann/json. The nlohmann/json project has no bug bounties, and since it is open source, third party individuals suggest fixes with no pressure/incentive to manipulate unfixed issues.
81
83
- How many faults may be unrecorded (or incorrectly closed, or downplayed)?
82
-
-**Answer**: Few or none, considering the wide use of the nlohmann/json library.
84
+
-**Answer**: Few or none, considering the wide use of the nlohmann/json library (see JLS-05).
83
85
- How do we collect lists of bugs and known vulnerabilities from components?
84
86
-**Answer**: We pull the list from the issues reported to nlohmann/json labelled as bug and are currently open or were opened since the last release. This list is then stored using GitHub, thereby enabling a traceability of the list.
85
87
- How (and how often) do we check these lists for relevant bugs and known vulnerabilities?
86
88
-**Answer**: Whenever we generate the documentation, the list is pulled. If there is an issue previously unrecorded, then the maintainer is encouraged by the change of the trustable score to check the relevance of the issue.
87
89
- How confident can we be that the lists are honestly maintained?
88
-
-**Answer**: Very confident, since the authors of the issues in the list mainly comprise of independent downstream users.
90
+
-**Answer**: Very confident, since the authors of the issues in the list mainly comprise independent downstream users.
89
91
- Could some participants have incentives to manipulate information?
90
92
-**Answer**: No such incentives have been identified.
91
93
- How confident are we that the lists are comprehensive?
92
-
-**Answer**: Fairly confident, considering the wide use of the library and that downstream users are likely to report discovered bugs.
94
+
-**Answer**: Fairly confident, considering the wide use of the library (see JLS-05) and that downstream users are likely to report discovered bugs.
93
95
- Could there be whole categories of bugs/vulnerabilities still undiscovered?
94
-
-**Answer**: Unlikely, considering the wide use of the library and that downstream users are likely to report discovered bugs.
96
+
-**Answer**: Unlikely, considering the wide use of the library (see JLS-05) and that downstream users are likely to report discovered bugs.
95
97
- How effective is our triage/prioritisation?
96
98
-**Answer**: There is no development of the json library within S-CORE, and therefore no triage/prioritisation. Any identified bugs/vulnerabilities are reported to nlohmann/json. Within nlohmann/json, no formal triage process has been identified. Nevertheless, reported bugs and vulnerabilities seem to be handled in a timely manner.
97
99
- How many components have never been updated?
98
100
-**Answer**: None, the nlohmann/json library consists of a single header file, which the only component. This component is up to date.
99
101
- How confident are we that we could update them?
100
-
-**Answer**: If a new version of the nlohmann/json library is released, we are very confident that we can update to that version.
102
+
-**Answer**: Within nlohmann/json, there are no external components to update. Within S-CORE, if a new version of the nlohmann/json library is released, we are very confident that we can update to that version. (See the update process in TSF/README.md)
101
103
- How confident are we that outstanding fixes do not impact our Expectations?
102
-
-**Answer**: No outstanding fixes that impact the Expectation have been identified.
104
+
-**Answer**: No outstanding fixes that impact the Expectations have been identified.
103
105
- How confident are we that outstanding fixes do not address Misbehaviours?
104
106
-**Answer**: Very confident, as no Misbehaviours have been identified.
Copy file name to clipboardExpand all lines: TSF/trustable/assertions/TA-INDICATORS_CONTEXT.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,8 @@ level: 1.1
3
3
normative: false
4
4
---
5
5
6
+
(Note: The guidance, evidence, confidence scoring and checklist sections below are copied from [CodeThink's documentation of TSF](https://codethinklabs.gitlab.io/trustable/trustable/trustable/TA.html). However, the answers to each point in the evidence list and checklist are specific to this project.)
7
+
6
8
Not all deviations from Expected Behaviour can be associated with a specific
7
9
condition. Therefore, we must have a strategy for managing deviations that
8
10
arise from unknown system states, process vulnerabilities or configurations.
Copy file name to clipboardExpand all lines: TSF/trustable/assertions/TA-INPUTS_CONTEXT.md
+11-9Lines changed: 11 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,25 +3,27 @@ level: 1.1
3
3
normative: false
4
4
---
5
5
6
+
(Note: The guidance, evidence, confidence scoring and checklist sections below are copied from [CodeThink's documentation of TSF](https://codethinklabs.gitlab.io/trustable/trustable/trustable/TA.html). However, the answers to each point in the evidence list and checklist are specific to this project.)
7
+
6
8
**Guidance**
7
9
8
-
Anything that can influence the output of the XYZ project is considered an input.
10
+
Anything that can influence the output of the nlohmann/json project is considered an input.
9
11
This includes:
10
12
11
13
- Software components used to implement specified features and meet defined Expectations
12
14
- Software tools, and their outputs, used for design, construction and verification
13
15
- Infrastructure that supports development and release processes
14
16
15
-
All inputs (components, tools, data) and their dependencies (recursively) used to build and verify XYZ releases must be identified and assessed, since they are untrusted by default.
17
+
All inputs (components, tools, data) and their dependencies (recursively) used to build and verify nlohmann/json releases must be identified and assessed, since they are untrusted by default.
16
18
17
19
Each input should be evaluated on verifiable merits, regardless of any claims it makes (including adherence to standards or guidance).
18
20
Evaluation must include the project's defined Expectations to ensure that inputs meet requirements, and that risks are recorded and addressed appropriately.
19
21
20
-
For components, we need to consider how their misbehaviour might impact achieving project XYZ's Expectations.
22
+
For components, we need to consider how their misbehaviour might impact achieving project nlohmann/json's Expectations.
21
23
Sources (e.g. bug databases, advisories) for known risks should be identified, their update frequency recorded, and tests defined for detecting them.
22
24
These form the inputs to TA-FIXES.
23
25
24
-
For the tools used to construct and verify XYZ, we need to consider how their misbehaviour could:
26
+
For the tools used to construct and verify nlohmann/json, we need to consider how their misbehaviour could:
25
27
26
28
- Introduce unintended changes
27
29
- Fail to detect Misbehaviours during testing
@@ -45,28 +47,28 @@ As a result, for example, any binary inputs without reproducible build steps or
45
47
46
48
**Evidence**
47
49
48
-
- List of components used to build XYZ, including:
50
+
- List of components used to build nlohmann/json, including:
49
51
- Whether content is provided as source or binary
50
52
-**Answer**:
51
53
- Record of component assessments:
52
54
- Originating project and version
53
55
-**Answer**:
54
56
- Date of assessments and identity of assessors
55
57
-**Answer**:
56
-
- Role of component in XYZ
58
+
- Role of component in nlohmann/json
57
59
-**Answer**:
58
60
- Sources of bug and risk data
59
61
-**Answer**:
60
62
- Potential misbehaviours and risks identified and assessed
61
63
-**Answer**:
62
-
- List of tools used to build and verify XYZ
64
+
- List of tools used to build and verify nlohmann/json
63
65
-**Answer**:
64
66
- Record of tool assessments:
65
67
- Originating project and tool version
66
68
-**Answer**:
67
69
- Date of assessments and identity of assessors
68
70
-**Answer**:
69
-
- Role of the tool in XYZ releases
71
+
- Role of the tool in nlohmann/json releases
70
72
-**Answer**:
71
73
- Potential misbehaviours and impacts
72
74
-**Answer**:
@@ -79,7 +81,7 @@ As a result, for example, any binary inputs without reproducible build steps or
79
81
80
82
Confidence scoring for TA-INPUTS is based on the set of components and tools
81
83
identified, how many of (and how often) these have been assessed for their risk
82
-
and impact for XYZ, and the sources of risk and issue data identified.
84
+
and impact for nlohmann/json, and the sources of risk and issue data identified.
Copy file name to clipboardExpand all lines: TSF/trustable/assertions/TA-ITERATIONS_CONTEXT.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,8 @@ level: 1.1
3
3
normative: false
4
4
---
5
5
6
+
(Note: The guidance, evidence, confidence scoring and checklist sections below are copied from [CodeThink's documentation of TSF](https://codethinklabs.gitlab.io/trustable/trustable/trustable/TA.html). However, the answers to each point in the evidence list and checklist are specific to this project.)
7
+
6
8
**Guidance**
7
9
8
10
This assertion is best satisfied by checking generated documentation to confirm that:
0 commit comments