A Clojure tool for vulnerability checking.
clj-watson
is a software composition analysis (SCA) tool that scans
dependencies specified in a Clojure deps.edn
file looking for vulnerable direct and
transitive dependencies, and builds a report with all the information needed
to help you understand how the vulnerabilities manifest in your software.
clj-watson
can suggest a remediation for the vulnerabilities found,
and can check against both the
NIST National Vulnerability Database (NVD)
(by default) and the
GitHub Advisory Database
(experimental).
clj-watson
can be added as an alias either on a per-project basis in your
project's deps.edn
file or in your user deps.edn
file
(either ~/.clojure/deps.edn
or ~/.config/clojure/deps.edn
):
;; in :aliases
:clj-watson {:replace-deps
{io.github.clj-holmes/clj-watson
{:git/tag "v6.0.0" :git/sha "cb02879"}}
:main-opts ["-m" "clj-watson.cli"]}
Important
You'll need to first setup your NVD API key.
Then you can run it with:
clojure -M:clj-watson scan -p deps.edn
The first time it runs, it will download the entire vulnerability database, which can take several minutes. Subsequent runs will be much faster.
Note
The database is stored in your local Maven cache (on macOS/Linux, that's under ~/.m2/repository/org/owasp/dependency-check-utils/10.0.4/data/9.0/
currently) - in case you ever need to delete that folder, if it looks like the database is corrupted.
clj-watson
can also be installed as a Clojure CLI tool:
clojure -Ttools install-latest :lib io.github.clj-holmes/clj-watson :as clj-watson
Then can be run via:
clojure -Tclj-watson scan :deps-edn-path '"deps.edn"' :output '"stdout"'
# or:
clojure -Tclj-watson scan '{:deps-edn-path "deps.edn" :output "stdout"}'
The tool option keywords match the long-form CLI option names (see below) but the abbreviations are also supported. In addition, any string option may be specified as a bare Clojure symbol (if it is legally representable as such), which means the above command-line can be simplified to just:
clojure -Tclj-watson scan :p deps.edn
:output
can be omitted because it defaults to stdout
, and :deps-edn-path
can be shortened to :p
(matching the -p
short form of --deps-edn-path
).
Note
:aliases
(or :a
) should be specified as a vector of keywords (or symbols), e.g., :a '[:foo :bar]
, whereas it would be specified multiple times (as strings) in the regular CLI, -a foo -a bar
.
clj-watson
supports two methods for vulnerabilities scans.
DependencyCheck is the most widely used method among the Clojure/Java SCA tools. It:
- Downloads a database of known vulnerabilities from NIST NVD, storing it locally (inside your local Maven cache, under
~/.m2/repository/org/owasp/dependency-check-utils/10.0.3/data/9.0/
currently). - Scans JARs from dependencies specified in your
deps.edn
- Composes a Common Platform Enumeration (CPE) based on your dependencies
- Returns any matching vulnerabilities
clj-watson
then reports these findings to you, optionally with potential remediations.
Important
We always recommend using the latest version of clj-watson
, but as a minimum upgrade to v5.1.3.
All earlier versions of clj-watson
are officially deprecated.
Older versions of clj-watson
use older problematic versions of DependencyCheck, which NIST is now blocking.
Important
The NIST NVD data feeds discourage access without API keys by heavily throttling anonymous requests. So, request one and use it.
It is easy to request an API key.
You can specify you key via:
- The
nvd.api.key
Java system property on the command line - Or, the
CLJ_WATSON_NVD_API_KEY
environment variable - Or, an
nvd.api.key
entry in yourclj-watson.properties
file
Caution
Keeping your nvd api key secret is your responsibility. This is not a hugely sensitive secret, but you don't want others to use your key. You do not want to check it into any public version control system.
Example usage:
clojure -J-Dnvd.api.key=<your key here> -M:clj-watson scan -p deps.edn
Or:
clojure -J-Dnvd.api.key=<your key here> -Tclj-watson scan :p deps.edn
Replace <your key here>
with your actual api key.
Caution
You could specify this system property under :jvm-opts
in your deps.edn
under your :clj-watson
alias, but be careful not to commit it to version control.
Example usage:
CLJ_WATSON_NVD_API_KEY=<your key here> clojure -M:clj-watson scan -p deps.edn
Or:
export CLJ_WATSON_NVD_API_KEY=<your key here>
clojure -M:clj-watson scan -p deps.edn
Or:
CLJ_WATSON_NVD_API_KEY=<your key here> clojure -Tclj-watson scan :p deps.edn
Or:
export CLJ_WATSON_NVD_API_KEY=<your key here>
clojure -Tclj-watson scan :p deps.edn
Replace <your key here>
with your actual api key.
Specify your key in your clj-watson.properties
file:
# clj-watson.properties file
nvd.api.key=<your key here>
Replace <your key here>
with your actual api key.
clj-watson
will pick up clj-watson.properties
automatically if it is on the classpath, or you can specify it on the command line via the -w
/ --clj-watson-properties
option:
clojure -M:clj-watson scan -p deps.edn --clj-watson-properties ./clj-watson.properties
Or:
clojure -Tclj-watson scan :p deps.edn :clj-watson-properties ./clj-watson.properties
Caution
Be careful not to commit your key to version control.
This approach doesn't need to download a database since it uses the GitHub Advisory Database via its GraphQL API, and matches are made via package names.
In order to use this approach, it is necessary to generate a GitHub Personal Access Token (PAT) to access the GraphQL API, or if you use GitHub Actions it is possible to use their GitHub token.
Another important thing to be aware of is that the API has a limit of 5,000 requests per hour/per PAT.
If you create a PAT or use the GitHub Action token, you can set it as an
environment variable named GITHUB_TOKEN
and clj-watson
will be able to use it.
Sometimes, the transitive dependency tree is not under your control and it is
not always possible to override vulnerable dependencies.
You can allow a CVE for a limited period by adding a clj-watson-config.edn
configuration file to your classpath with the following structure:
{:allow-list {:cves [{:cve-label "CVE-0000"
:expires "2000-01-01"}
{:cve-label "CVE-00000"
:expires "2000-01-01"}]}}
Note: this is for the GitHub Advisory Database strategy only.
The big difference between clj-watson
and other tools!
Since fixing the vulnerabilities found manually can be a truly frustrating
process clj-watson
provides a way to suggest a remediation.
It performs lookups for the whole dependency tree, checking if the latest version of a parent dependency uses the secure version of the child dependency until it reaches the direct dependency.
Given the following dependency tree,
[dependency-a "v1"]
[dependency-b "v1"]
[dependency-c "v1"]
where dependency-c
is vulnerable and fixing it would require a bump from v1
to v2
, clj-watson
will try to find a version of dependency-a
that uses
a version of dependency-b
that uses dependency-c
at version v2
, and then
clj-watson
will propose updating dependency-a
.
{dependency-a {:mvn/version "v4"}}
If clj-watson
does not find a version of dependency-b
or dependency-a
that
satisfies this condition, it will propose an exclusion instead:
{dependency-a {:exclusions [dependency-b]}
dependency-b {:mvn/version "v3"}}
In order to get the automated remediation suggestions, provide
the --suggest-fix
or -s
option when running clj-watson
.
Important
You'll need to setup your NVD API key.
clj-watson
can be installed as a Clojure CLI tool, as shown above. While
this is the easiest way to install the latest version and keep it up-to-date
(using clojure -Ttools install-latest
), it also means using the key/value
EDN-style options for the CLI tool, which can at first seem a bit unwieldy:
clojure -Tclj-watson scan '{:output "stdout" :fail-on-result true :deps-edn-path "deps.edn" :suggest-fix true :aliases ["*"] :database-strategy "dependency-check"}'
# or:
clojure -Tclj-watson scan :f true :p deps.edn :s true :a '[*]'
Both :output
(:o
) and :database-strategy
(:t
) can be omitted because
they default to "stdout"
and "dependency-check"
respectively.
In addition to the CLI tool install, shown above, it can also be invoked
directly via the Clojure CLI, by specifying clj-watson
as a dependency
via -Sdeps
:
clojure -Sdeps '{:deps {io.github.clj-holmes/clj-watson {:git/tag "v6.0.0" :git/sha "cb02879"}}}' -M -m clj-watson.cli scan -p deps.edn
Or you can just add it to your deps.edn
file as an alias:
{:deps {}
:aliases
{:clj-watson {:replace-deps {io.github.clj-holmes/clj-watson {:git/tag "v6.0.0" :git/sha "cb02879"}}
:main-opts ["-m" "clj-watson.cli"]}}}
and invoke it with:
clojure -M:clj-watson scan -p deps.edn
You can get a full list of the available options by running:
clojure -M:clj-watson scan --help
This produces:
clj-watson
ARG USAGE:
scan [options..]
OPTIONS:
-p, --deps-edn-path <file> Path of deps.edn file to scan [*required*]
-o, --output <json|edn|stdout|stdout-simple|sarif> Output type for vulnerability findings [stdout]
-a, --aliases Include deps.edn aliases in analysis, specify '*' for all.
For multiple, repeat arg, ex: -a alias1 -a alias2
-t, --database-strategy <dependency-check|github-advisory> Vulnerability database strategy [dependency-check]
-s, --suggest-fix Include dependency remediation suggestions in vulnurability findings [false]
-f, --fail-on-result When enabled, exit with non-zero on any vulnerability findings
Useful for CI/CD [false]
-c, --cvss-fail-threshold <score> Exit with non-zero when any vulnerability's CVSS base score is >= threshold
CVSS scores range from 0.0 (least severe) to 10.0 (most severe)
We interpret a score of 0.0 as suspicious
Missing or suspicious CVSS base scores are conservatively derived
Useful for CI/CD
-h, --help Show usage help
OPTIONS valid when database-strategy is dependency-check:
-w, --clj-watson-properties <file> Path of an additional, optional properties file
Overrides values in dependency-check.properties
If not specified classpath is searched for cljwatson.properties
--run-without-nvd-api-key Run without an nvd.api.key configured.
It will be slow and we cannot recommend it.
See docs for configuration. [false]
When using the dependency-check
database-strategy
, clj-watson
will:
- load its internal default
dependency-check.properties
to apply to thedependency-check
scan - optionally override its defaults with your
clj-watson.properties
file- specified explicitly by you via
-w
(or--clj-watson-properties
) - else automatically found on your classpath
- specified explicitly by you via
In addition, relevant properties provided as Java system properties are
read by the underlying DependencyCheck scan, and take precedence over the
properties provided in these files. See the -Dnvd.api.key=
example above.
clj-watson
also supports environment variables that start with CLJ_WATSON_
.
These are used to set properties that are not provided on the command line.
The CLJ_WATSON_
prefix is removed, and the rest of the name is converted to
a lowercase property name with _
replaced by .
(e.g., CLJ_WATSON_NVD_API_KEY
).
To specify a property name that contains an underscore, use two underscores
in the environment variable name, e.g., CLJ_WATSON_DATA_FILE__NAME
to
set the data.file_name
property.
Properties set via environment variables take precedence over those set in the properties files described above, but not over Java system properties set on the command-line.
Environment variables are often the most straightforward and most secure way to provide sensitive information like API keys in various CI systems.
The minimum needed to run clj-watson
is to provide the path to a deps.edn
file, but it is recommended that you also provide the -s
option so
clj-watson
will try to suggest remediations for any vulnerabilities found.
Important
You'll need to first setup your NVD API key.
clojure -M:clj-watson -p deps.edn
...
Dependency Information
-----------------------------------------------------
NAME: dependency-e
VERSION: 1
DEPENDENCY FOUND IN:
[dependency-a]
[dependency-b]
[dependency-a]
[dependency-c]
[dependency-d]
FIX SUGGESTION: {dependency-a {:mvn/version "3"}}
Vulnerabilities
-----------------------------------------------------
SEVERITY: Information not available.
IDENTIFIERS: CVE-2022-1000000
CVSS: 7.5 (version 3.1)
PATCHED VERSION: 1.55
SEVERITY: Information not available.
IDENTIFIERS: CVE-2022-2000000
CVSS: 5.3
PATCHED VERSION: 1.55
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
A Common Vulnerability Scoring System (CVSS) score is a number from 0.0
to 10.0
that conveys the severity of a vulnerability.
There are multiple different scores available, but clj-watson
will always only report and use the base score.
Over the years, CVSS has been revised a number of times.
As of this writing, you can expect to see versions 2.0
, 3.0
, 3.1
, and 4.0
.
Sometimes, a single vulnerability will specify scores from multiple CVSS versions.
To err on the side of caution, clj-watson
will always use and report the highest base score.
If you are curious about other scores, you can always bring up the CVE on the NVD NIST website, for an arbitrary example: https://nvd.nist.gov/vuln/detail/CVE-2022-21724.
A severity is low
, medium
, high
, or critical
, and is based on the CVSS score.
See the NVD NIST website description for details.
Tip
The experimental github-advisory
strategy has some differences:
- In addition to
medium
can return a severity ofmoderate
which is equivalent tomedium
.clj-watson
will always convertmoderate
tomedium
forgithub-advisory
. - It only populates scores from a single CVSS version.
- It does not always populate the CVSS score, or populates it with
0.0
.
By default, clj-watson
exits with 0
.
You can opt to have clj-watson
exit with a non-zero value when it detects vulnerabilities, which can be useful when running from a continuous integration (CI) server or service.
Specify --fail-on-result
(or -f
) to exit with non-zero when any vulnerabilities are detected.
Example usages:
clojure -M:clj-watson --deps-edn-path deps.edn --fail-on-result
clojure -Tclj-watson :deps-edn-path deps.edn :fail-on-result true
For finer control use --cvss-fail-threshold
(or -c
) to specify a CVSS score at which to fail.
When any detected vulnerability has a score equal to or above the threshold, clj-watson
will summarize vulnerabilities that have met the threshold and exit with non-zero.
Example usages:
clojure -M:clj-watson --deps-edn-path deps.edn --cvss-fail-threshold 5.8
clojure -Tclj-watson :deps-edn-path deps.edn :cvss-fail-threshold 5.8
Example summary:
CVSS fail score threshold of 5.8 met for:
Dependency Version Identifiers CVSS Score
org.apache.httpcomponents/httpclient 4.1.2 CVE-2014-3577 5.8 (version 2.0)
com.fasterxml.jackson.core/jackson-annotations 2.4.0 CVE-2018-1000873 6.5 (version 3.1)
com.fasterxml.jackson.core/jackson-core 2.4.2 CVE-2018-1000873 6.5 (version 3.1)
org.jsoup/jsoup 1.6.1 CVE-2021-37714 7.5 (version 3.1)
com.fasterxml.jackson.core/jackson-databind 2.4.2 CVE-2020-9548 9.8 (version 3.1)
org.clojure/clojure 1.8.0 CVE-2017-20189 9.8 (version 3.1)
org.codehaus.plexus/plexus-utils 3.0 CVE-2017-1000487 9.8 (version 3.1)
When the score is missing or suspicious-looking, clj-watson
will conservatively derive a score and indicate how it has done so (see httpclient
below):
CVSS fail score threshold of 5.8 met for:
Dependency Version Identifiers CVSS Score
org.jsoup/jsoup 1.6.1 GHSA-m72m-mhq2-9p6c CVE-2021-37714 7.5 (version 3.1)
com.fasterxml.jackson.core/jackson-databind 2.4.2 GHSA-qxxx-2pp7-5hmx CVE-2017-7525 9.8 (version 3.1)
com.mchange/c3p0 0.9.5.2 GHSA-q485-j897-qc27 CVE-2018-20433 9.8 (version 3.0)
org.clojure/clojure 1.8.0 GHSA-jgxc-8mwq-9xqw CVE-2017-20189 9.8 (version 3.1)
org.codehaus.plexus/plexus-utils 3.0 GHSA-8vhq-qq4p-grq3 CVE-2017-1000487 9.8 (version 3.1)
org.apache.httpcomponents/httpclient 4.1.2 GHSA-2x83-r56g-cv47 CVE-2012-6153 10.0 (score 0.0 suspicious - derived from High severity)
clj-watson
uses SLFJ4 and Logback to collect and filter meaningful log output from its dependencies.
This output goes to stderr
.
It writes settings and vulnerability findings to stdout
.
clojure -M:nREPL -m nrepl.cmdline
clojure -M:test
We use clojure-lsp from the command line to lint:
clojure -M:clojure-lsp format
clojure -M:clojure-lsp clean-ns
clojure -M:clojure-lsp diagnostics
We use clj-holmes to check for potentially vulnerable patterns in clj-watson source code:
clj-holmes scan -p .
Copyright © 2021-2024 Matheus Bernardes
Distributed under the Eclipse Public License version 2.0.