Top
Best
New

Posted by todsacerdoti 7 hours ago

Turn Dependabot Off(words.filippo.io)
309 points | 79 commentspage 2
mehagar 6 hours ago|
Is there an equivalent for the JS ecosystem? If not, having Dependabot update dependencies automatically after a cooldown still seems like a better alernative, since you are likely to never update dependencies at all if it's not automatic.
seattle_spring 6 hours ago||
RenovateBot supports a ton of languages, and ime works much better for the npm ecosystem than Dependabot. Especially true if you use an alternative package manager like yarn/pnpm.
mook 6 hours ago||
Too bad dependabot cooldowns are brain-dead. If you set a cooldown for one week, and your dependency can't get their act together and makes a release daily, it'll start making PRs for the first (oldest) release in the series after a week even though there's nothing cool about the release cadence.
kleyd 5 hours ago||
The cooldown is to allow vulnerabilities to be discovered. So auto update on passing tests, which should include an npm audit check.
operator-name 4 hours ago||
The custom Github Actions approach is very customisable and flexible. In theory you could make and even auto approve bumps.

If you want something more structured, I’ve been playing with and can recommend Renovate (no affiliation). Renovate supports far more ecosystems, has a better community and customisation.

Having tried it I can’t believe how relatively poor Dependabot, the default tool is something we put up with by default. Take something simple like multi layer dockerfiles. This has been a docker features for a while now, yet it’s still silently unsupported by dependabot!

esafak 4 hours ago|
That's what a lack of competition does. Github is entrenched, complacent.
robszumski 6 hours ago||
We’ve built a modern dependabot (or works with it) agent: fossabot analyzes your app code to know how you use your dependencies then delivers a custom safe/needs review verdict per upgrade or packages groups of safe upgrades together to make more strategic jumps. We can also fix breaking changes because the agents context is so complete.

https://fossa.com/products/fossabot/

We have some of the best JS/TS analysis out there based on a custom static analysis engine designed for this use-case. You get free credits each month and we’d love feedback on which ecosystems are next…Java, Python?

Totally agree with the author that static analysis like govulncheck is the secret weapon to success with this problem! Dynamic languages are just much harder.

We have a really cool eval framework as well that we’ve blogged about.

MattIPv4 5 hours ago|||
Are y'all aware your agent's name clashes with an established and rather popular streaming bot/tool, https://fossabot.com ?
stavros 4 hours ago|||
That would explain why I tried to get vulnerability notifications and instead all my code was streamed to Twitch.
NewJazz 3 hours ago|||
Spitballing some alt names

Fossadep

Fossacheck

Fossasafe

robszumski 4 hours ago|||
example analysis on a Dependabot PR: https://github.com/daniellockard/tiltify-api-client/pull/36#...
necubi 5 hours ago|||
Would love to see this for Rust!
AutumnsGarden 5 hours ago||
I think python and go could be great use cases
arianvanp 4 hours ago||
At this point your steps are so simple id skip GitHub actions security tyre fire altogether. Just run the go commands whilst listening on GitHub webhooks and updating checks with the GitHub checks API.

GitHub actions is the biggest security risk in this whole setup.

Honestly not that complicated.

NewJazz 3 hours ago|
I learned recently that self-hosted GHA runners are just VMs your actions have shell access to, and cleanup is on the honor system for the most part.

Absolutely wild.

aswihart 4 hours ago||
> Dependencies should be updated according to your development cycle, not the cycle of each of your dependencies. For example you might want to update dependencies all at once when you begin a release development cycle, as opposed to when each dependency completes theirs.

We're in this space and our approach was to supplement Dependabot rather than replace it. Our app (https://www.infield.ai) focuses more on the project management and team coordination aspect of dependency management. We break upgrade work down into three swim lanes: a) individual upgrades that are required in order to address a known security vulnerability (reactive, most addressed by Dependabot) b) medium-priority upgrades due to staleness or abandonedness, and c) framework upgrades that may take several months to complete, like upgrading Rails or Django. Our software helps you prioritize the work in each of these buckets, record what work has been done, and track your libyear over time so you can manage your maintenance rotation.

adamdecaf 5 hours ago||
govulncheck is the much better answer and we use it.

We also let renovate[bot] (similar to dependabot) merge non-major dep updates if tests pass. I hardly notice when deps have small updates.

https://github.com/search?q=org%3Amoov-io+is%3Apr+is%3Amerge...

NewJazz 3 hours ago||
Besides go, what languages have this type of fidelity for vulnerability scope. Python? Node? Rust?
snowhale 6 hours ago||
govulncheck is so much better for Go projects. it actually traces call paths so you only get alerted if the vulnerable function is reachable from your code. way less noise.
bpavuk 7 hours ago||
is there a `govulncheck`-like tool for the JVM ecosystem? I heard Gradle has something like that in its ecosystem.

search revealed Sonatype Scan Gradle plugin. how is it?

wpollock 3 hours ago|
It's been a few years, but for Java I used OWASP: <https://owasp.org/www-project-dependency-check/>, which downloads the NVD (so first run was slow) and scans all dependicies against that. I ran it from maven as part of the build.
literallyroy 7 hours ago|
The go ecosystem is pretty good about being backwards compatible. Dependabot regular update prs once a week seems like a good option in addition to govulncheck.
More comments...