Sorts is the product responsible for helping End Users sort files in a Git repository by its probability of containing security vulnerabilities. It does so by using Machine Learning and producing a Model that is then used by:
- End users, through:
- Fluid Attacks internal systems, to update the priority in Integrates of the source code that Fluid Attacks Hackers audit.
None at the moment, Sorts is yet an experimental project.
Sorts uses a Machine Learning Pipeline architecture, namely, many models are trained and improved automatically as the data evolves, and the best model is chosen according to some predefined criteria set up by the Sorts Maintainer.
At all points in time, we report statistics to the Redshift cluster provided by Observes, which allows us to monitor the progress of the model over time, and intervene in the pipeline if something doesn't go as planned.
The source data is taken from the vulnerabilities at Integrates that human hackers at Fluid Attacks have found, which contain information like the type of vulnerability, the name of the source code repository in which it was found, the path to the file where it was found, and the problematic line number.
Roughly, the pipeline consists of the following steps:
/sorts/extract-features: Whose purpose is to clone all source code repositories, and produce a CSV with the features for each file in the repository.
/sorts/merge-features: Which takes the features from the previous step, and merges them into a single CSV.
/sorts/training-and-tune: Who takes the CSV from the previous step and trains different models using SageMaker by Amazon Web Services.
SageMaker takes the training data from the previous step and uploads the trained model to a bucket on S3 by Amazon Web Services.
Last but not least, the best model is selected automatically and uploaded to the same bucket, but in a constant location.
This Best Model is the output of the pipeline.
/sorts/execute: Takes the "Best Model" and uses it to prioritize the files at Integrates.
/sorts/association*: This is an attempt to make Sorts recommend the type of vulnerability that a file may contain as well.
You can right-click on the image below to open it in a new tab, or save it to your computer.
Please read the contributing page first.
Follow the steps in the Development Environment section of our documentation.
If prompted for an AWS role, choose
and when prompted for a Development Environment, pick