Dependabot and security pull requests: large empirical study

被引:0
|
作者
Rebatchi, Hocine [1 ]
Bissyande, Tegawende F. [2 ]
Moha, Naouel [1 ]
机构
[1] Ecole Technol Super, Montreal, PQ, Canada
[2] Univ Luxembourg, Luxembourg, Luxembourg
基金
欧洲研究理事会; 加拿大自然科学与工程研究理事会;
关键词
Dependabot; Dependency; Software vulnerability; Software supply chain; GitHub; Pull request;
D O I
10.1007/s10664-024-10523-y
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Modern software development is a complex engineering process where developer code cohabits with an increasingly larger number of external open-source components. Even though these components facilitate sharing and reusing code along with other benefits related to maintenance and code quality, they are often the seeds of vulnerabilities in the software supply chain leading to attacks with severe consequences. Indeed, one common strategy used to conduct attacks is to exploit or inject other security flaws in new versions of dependency packages. It is thus important to keep dependencies updated in a software development project. Unfortunately, several prior studies have highlighted that, to a large extent, developers struggle to keep track of the dependency package updates, and do not quickly incorporate security patches. Therefore, automated dependency-update bots have been proposed to mitigate the impact and the emergence of vulnerabilities in open-source projects. In our study, we focus on Dependabot, a dependency management bot that has gained popularity on GitHub recently. It allows developers to keep a lookout on project dependencies and reduce the effort of monitoring the safety of the software supply chain. We performed a large empirical study on dependency updates and security pull requests to understand: (1) the degree and reasons of Dependabot's popularity; (2) the patterns of developers' practices and techniques to deal with vulnerabilities in dependencies; (3) the management of security pull requests (PRs), the threat lifetime, and the fix delay; and (4) the factors that significantly correlate with the acceptance of security PRs and fast merges. To that end, we collected a dataset of 9,916,318 pull request-related issues made in 1,743,035 projects on GitHub for more than 10 different programming languages. In addition to the comprehensive quantitative analysis, we performed a manual qualitative analysis on a representative sample of the dataset, and we substantiated our findings by sending a survey to developers that use dependency management tools. Our study shows that Dependabot dominates more than 65% of dependency management activity, mainly due to its efficiency, accessibility, adaptivity, and availability of support. We also found that developers handle dependency vulnerabilities differently, but mainly rely on the automation of PRs generation to upgrade vulnerable dependencies. Interestingly, Dependabot's and developers' security PRs are highly accepted, and the automation allows to accelerate their management, so that fixes are applied in less than one day. However, the threat of dependency vulnerabilities remains hidden for 512 days on average, and patches are disclosed after 362 days due to the reliance on the manual effort of security experts. Also, project characteristics, the amount of PR changes, as well as developer and dependency features seem to be highly correlated with the acceptance and fast merges of security PRs.
引用
收藏
页数:63
相关论文
共 50 条
  • [1] On the Use of Dependabot Security Pull Requests
    Alfadel, Mahmoud
    Costa, Diego Elias
    Shihab, Emad
    Mkhallalati, Mouafak
    2021 IEEE/ACM 18TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES (MSR 2021), 2021, : 254 - 265
  • [2] An Empirical Study on GitHub Pull Requests' Reactions
    Batoun, Mohamed Amine
    Yung, Ka Lai
    Tian, Yuan
    Sayagh, Mohammed
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2023, 32 (06)
  • [3] Opportunities and Challenges in Repeated Revisions to Pull-Requests: An Empirical Study
    Li Z.
    Yu Y.
    Wang T.
    Li S.
    Wang H.
    Proceedings of the ACM on Human-Computer Interaction, 2022, 6 (CSCW2)
  • [4] An empirical study on developers' shared conversations with ChatGPT in GitHub pull requests and issues
    Hao, Huizi
    Hasan, Kazi Amit
    Qin, Hong
    Macedo, Marcos
    Tian, Yuan
    Ding, Steven H. H.
    Hassan, Ahmed E.
    EMPIRICAL SOFTWARE ENGINEERING, 2024, 29 (06)
  • [5] Redundancy, Context, and Preference: An Empirical Study of Duplicate Pull Requests in OSS Projects
    Li, Zhixing
    Yu, Yue
    Zhou, Minghui
    Wang, Tao
    Yin, Gang
    Lan, Long
    Wang, Huaimin
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2022, 48 (04) : 1309 - 1335
  • [6] How do Developers Improve Code Readability? An Empirical Study of Pull Requests
    Dantas, Carlos Eduardo C.
    Rocha, Adriano M.
    Maia, Marcelo A.
    2023 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION, ICSME, 2023, : 110 - 122
  • [7] An Empirical Study on Pull-requests Revisions in Open Source Artificial Intelligence Projects
    Li Z.-X.
    Yu Y.
    Wang T.
    Cai M.-L.
    Wang H.-M.
    Ruan Jian Xue Bao/Journal of Software, 2023, 34 (09):
  • [8] Using knowledge units of programming languages to recommend reviewers for pull requests: an empirical study
    Ahasanuzzaman, Md
    Oliva, Gustavo A.
    Hassan, Ahmed E.
    EMPIRICAL SOFTWARE ENGINEERING, 2024, 29 (01)
  • [9] Using knowledge units of programming languages to recommend reviewers for pull requests: an empirical study
    Md Ahasanuzzaman
    Gustavo A. Oliva
    Ahmed E. Hassan
    Empirical Software Engineering, 2024, 29
  • [10] Using Knowledge Units of Programming Languages to Recommend Reviewers for Pull Requests: An Empirical Study
    Ahasanuzzaman, Md
    Oliva, Gustavo A.
    Hassan, Ahmed E.
    arXiv, 2023,