Dependabot and security pull requests: large empirical study

被引:0
|
作者
Rebatchi, Hocine [1 ]
Bissyande, Tegawende F. [2 ]
Moha, Naouel [1 ]
机构
[1] Ecole Technol Super, Montreal, PQ, Canada
[2] Univ Luxembourg, Luxembourg, Luxembourg
基金
欧洲研究理事会; 加拿大自然科学与工程研究理事会;
关键词
Dependabot; Dependency; Software vulnerability; Software supply chain; GitHub; Pull request;
D O I
10.1007/s10664-024-10523-y
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Modern software development is a complex engineering process where developer code cohabits with an increasingly larger number of external open-source components. Even though these components facilitate sharing and reusing code along with other benefits related to maintenance and code quality, they are often the seeds of vulnerabilities in the software supply chain leading to attacks with severe consequences. Indeed, one common strategy used to conduct attacks is to exploit or inject other security flaws in new versions of dependency packages. It is thus important to keep dependencies updated in a software development project. Unfortunately, several prior studies have highlighted that, to a large extent, developers struggle to keep track of the dependency package updates, and do not quickly incorporate security patches. Therefore, automated dependency-update bots have been proposed to mitigate the impact and the emergence of vulnerabilities in open-source projects. In our study, we focus on Dependabot, a dependency management bot that has gained popularity on GitHub recently. It allows developers to keep a lookout on project dependencies and reduce the effort of monitoring the safety of the software supply chain. We performed a large empirical study on dependency updates and security pull requests to understand: (1) the degree and reasons of Dependabot's popularity; (2) the patterns of developers' practices and techniques to deal with vulnerabilities in dependencies; (3) the management of security pull requests (PRs), the threat lifetime, and the fix delay; and (4) the factors that significantly correlate with the acceptance of security PRs and fast merges. To that end, we collected a dataset of 9,916,318 pull request-related issues made in 1,743,035 projects on GitHub for more than 10 different programming languages. In addition to the comprehensive quantitative analysis, we performed a manual qualitative analysis on a representative sample of the dataset, and we substantiated our findings by sending a survey to developers that use dependency management tools. Our study shows that Dependabot dominates more than 65% of dependency management activity, mainly due to its efficiency, accessibility, adaptivity, and availability of support. We also found that developers handle dependency vulnerabilities differently, but mainly rely on the automation of PRs generation to upgrade vulnerable dependencies. Interestingly, Dependabot's and developers' security PRs are highly accepted, and the automation allows to accelerate their management, so that fixes are applied in less than one day. However, the threat of dependency vulnerabilities remains hidden for 512 days on average, and patches are disclosed after 362 days due to the reliance on the manual effort of security experts. Also, project characteristics, the amount of PR changes, as well as developer and dependency features seem to be highly correlated with the acceptance and fast merges of security PRs.
引用
收藏
页数:63
相关论文
共 50 条
  • [31] Bots for Pull Requests: The Good, the Bad, and the Promising
    Wessel, Mairieli
    Abdellatif, Ahmad
    Wiese, Igor
    Conte, Tayana
    Shihab, Emad
    Gerosa, Marco A.
    Steinmacher, Igor
    2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022), 2022, : 274 - 286
  • [32] Automated Code Reviewer Recommendation for Pull Requests
    Moosareza, Mina-Sadat
    Heydarnoori, Abbas
    E-INFORMATICA SOFTWARE ENGINEERING JOURNAL, 2024, 18 (01)
  • [33] What factors influence the lifetime of pull requests?
    Moreira Soares, Daricelio
    de Lima Junior, Manoel Limeira
    Murta, Leonardo
    Plastino, Alexandre
    SOFTWARE-PRACTICE & EXPERIENCE, 2021, 51 (06): : 1173 - 1193
  • [34] How do you Propose Your Code Changes? Empirical Analysis of Affect Metrics of Pull Requests on GitHub
    Ortu, Marco
    Destefanis, Giuseppe
    Graziotin, Daniel
    Marchesi, Michele
    Tonelli, Roberto
    IEEE ACCESS, 2020, 8 : 110897 - 110907
  • [35] Effective IS Security: An Empirical Study
    Straub, Detmar W., Jr.
    INFORMATION SYSTEMS RESEARCH, 1990, 1 (03) : 255 - 276
  • [36] What are the Characteristics of Reopened Pull Requests? A Case Study on Open Source Projects in GitHub
    Jiang, Jing
    Mohamed, Abdillah
    Zhang, Li
    IEEE ACCESS, 2019, 7 : 102751 - 102761
  • [37] Pull Requests or Commits? Which Method Should We Use to Study Contributors' Behavior?
    Bertoncello, Marcus Vinicius
    Pinto, Gustavo
    Wiese, Igor Scaliante
    Steinmacher, Igor
    PROCEEDINGS OF THE 2020 IEEE 27TH INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER '20), 2020, : 592 - 601
  • [38] How Do Software Developers Use ChatGPT? An Exploratory Study on GitHub Pull Requests
    Chouchen, Moataz
    Bessghaier, Narjes
    Begoug, Mahi
    Ouni, Ali
    AlOmar, Eman Abdullah
    Mkaouer, Mohamed Wiem
    2024 IEEE/ACM 21ST INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, 2024, : 212 - 216
  • [39] Balancing Security and Correctness in Code Generation: An Empirical Study on Commercial Large Language Models
    Black, Gavin S.
    Rimal, Bhaskar P.
    Vaidyan, Varghese Mathew
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE, 2025, 9 (01): : 419 - 430
  • [40] Multi-reviewing pull-requests: An exploratory study on GitHub OSS projects
    Hu, Dongyang
    Zhang, Yang
    Chang, Junsheng
    Yin, Gang
    Yu, Yue
    Wang, Tao
    INFORMATION AND SOFTWARE TECHNOLOGY, 2019, 115 : 1 - 4