Dependabot and security pull requests: large empirical study

被引:0
|
作者
Rebatchi, Hocine [1 ]
Bissyande, Tegawende F. [2 ]
Moha, Naouel [1 ]
机构
[1] Ecole Technol Super, Montreal, PQ, Canada
[2] Univ Luxembourg, Luxembourg, Luxembourg
基金
欧洲研究理事会; 加拿大自然科学与工程研究理事会;
关键词
Dependabot; Dependency; Software vulnerability; Software supply chain; GitHub; Pull request;
D O I
10.1007/s10664-024-10523-y
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Modern software development is a complex engineering process where developer code cohabits with an increasingly larger number of external open-source components. Even though these components facilitate sharing and reusing code along with other benefits related to maintenance and code quality, they are often the seeds of vulnerabilities in the software supply chain leading to attacks with severe consequences. Indeed, one common strategy used to conduct attacks is to exploit or inject other security flaws in new versions of dependency packages. It is thus important to keep dependencies updated in a software development project. Unfortunately, several prior studies have highlighted that, to a large extent, developers struggle to keep track of the dependency package updates, and do not quickly incorporate security patches. Therefore, automated dependency-update bots have been proposed to mitigate the impact and the emergence of vulnerabilities in open-source projects. In our study, we focus on Dependabot, a dependency management bot that has gained popularity on GitHub recently. It allows developers to keep a lookout on project dependencies and reduce the effort of monitoring the safety of the software supply chain. We performed a large empirical study on dependency updates and security pull requests to understand: (1) the degree and reasons of Dependabot's popularity; (2) the patterns of developers' practices and techniques to deal with vulnerabilities in dependencies; (3) the management of security pull requests (PRs), the threat lifetime, and the fix delay; and (4) the factors that significantly correlate with the acceptance of security PRs and fast merges. To that end, we collected a dataset of 9,916,318 pull request-related issues made in 1,743,035 projects on GitHub for more than 10 different programming languages. In addition to the comprehensive quantitative analysis, we performed a manual qualitative analysis on a representative sample of the dataset, and we substantiated our findings by sending a survey to developers that use dependency management tools. Our study shows that Dependabot dominates more than 65% of dependency management activity, mainly due to its efficiency, accessibility, adaptivity, and availability of support. We also found that developers handle dependency vulnerabilities differently, but mainly rely on the automation of PRs generation to upgrade vulnerable dependencies. Interestingly, Dependabot's and developers' security PRs are highly accepted, and the automation allows to accelerate their management, so that fixes are applied in less than one day. However, the threat of dependency vulnerabilities remains hidden for 512 days on average, and patches are disclosed after 362 days due to the reliance on the manual effort of security experts. Also, project characteristics, the amount of PR changes, as well as developer and dependency features seem to be highly correlated with the acceptance and fast merges of security PRs.
引用
收藏
页数:63
相关论文
共 50 条
  • [41] Understanding the role of external pull requests in the NPM ecosystem
    Maeprasart, Vittunyuta
    Wattanakriengkrai, Supatsara
    Kula, Raula Gaikovina
    Treude, Christoph
    Matsumoto, Kenichi
    EMPIRICAL SOFTWARE ENGINEERING, 2023, 28 (04)
  • [42] Understanding the role of external pull requests in the NPM ecosystem
    Vittunyuta Maeprasart
    Supatsara Wattanakriengkrai
    Raula Gaikovina Kula
    Christoph Treude
    Kenichi Matsumoto
    Empirical Software Engineering, 2023, 28
  • [43] Finding Impact Factors for Rejection of Pull Requests on GitHub
    Pooput, Panthip
    Muenchaisri, Pornsiri
    PROCEEDINGS OF 2018 VII INTERNATIONAL CONFERENCE ON NETWORK, COMMUNICATION AND COMPUTING (ICNCC 2018), 2018, : 70 - 76
  • [44] Understanding the Time to First Response In GitHub Pull Requests
    Hasan, Kazi Amit
    Macedo, Marcos
    Tian, Yuan
    Adams, Bram
    Ding, Steven
    2023 IEEE/ACM 20TH INTERNATIONAL CONFERENCE ON MINING SOFTWARE REPOSITORIES, MSR, 2023, : 1 - 11
  • [45] CTCPPre: A prediction method for accepted pull requests in GitHub
    Jiang Jing
    Zheng Jia-teng
    Yang Yun
    Zhang Li
    JOURNAL OF CENTRAL SOUTH UNIVERSITY, 2020, 27 (02) : 449 - 468
  • [46] How Developers Modify Pull Requests in Code Review
    Jiang, Jing
    Lv, Jiangfeng
    Zheng, Jiateng
    Zhang, Li
    IEEE TRANSACTIONS ON RELIABILITY, 2022, 71 (03) : 1325 - 1339
  • [47] How Developers Document Pull Requests with External References
    Zampetti, Fiorella
    Ponzanelli, Luca
    Bavota, Gabriele
    Mocci, Andrea
    Di Penta, Massimiliano
    Lanza, Michele
    2017 IEEE/ACM 25TH INTERNATIONAL CONFERENCE ON PROGRAM COMPREHENSION (ICPC), 2017, : 23 - 33
  • [48] Predicting which pull requests will get reopened in GitHub
    Mohamed, Abdillah
    Zhang, Li
    Jiang, Jing
    Ktob, Ahmed
    2018 25TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE (APSEC 2018), 2018, : 375 - 384
  • [49] Improving Feedback on GitHub Pull Requests: A Bots Approach
    Hu, Zhewei
    Gehringer, Edward F.
    2019 IEEE FRONTIERS IN EDUCATION CONFERENCE (FIE 2019), 2019,
  • [50] Nudge: Accelerating Overdue Pull Requests toward Completion
    Maddila, Chandra
    Upadrasta, Sai Surya
    Bansal, Chetan
    Nagappan, Nachiappan
    Gousios, Georgios
    van Deursen, Arie
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2023, 32 (02)