Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Securitybot: Open Sourcing Automated Security at Scale (dropbox.com)
150 points by hepha1979 on Feb 22, 2017 | hide | past | favorite | 23 comments


The next logical evolution is writing a bot that responds with "yes" and some BOFH-style explanation in your stead when securitybot comes asking.

Which is my way of saying that those automatic queries will likely start to annoy folks very soon, and they'll find a way not to deal with them.


I could get on board with BOFH mad libs.


Interesting timing given that Netflix announced an open source security offering of their own: http://techblog.netflix.com/2017/02/introducing-netflix-stet...



If I am reading this correctly, I'm a little surprised that Dropbox is sending their security problems through another company's (Slack's) chat system.


I think that once you make then decision to use another companies chat system, you have to recognize that just about any information might end up on it.

I can't imagine trying to educate users (outside of an environment in which this thinking is normal) about what can and cannot go over which medium.

The realtime(ish) notifications and questions that they describe in the blog post seem relatively benign compared to say, product planning discussions.

Disclaimer: I used to work at Dropbox and know the individuals involved


Netflix uses another companies infrastructure (AWS), and I'd suspect another company for source control.

Most of the world is doing this now. It's cheaper, easier and in most cases more secure.


That was my concern too. What are the security aspects behind it?


Everyone uses Gmail & Hangouts, and no one bats an eye.


The sql executes they are using build queries with "%s" instead of using ? parameters. I guess they foresee that those scripts only see friendly data but it's better to be safe than sorry and protect against sql injection from day 1.

Example https://github.com/dropbox/securitybot/blob/master/plugins/s...


I work on the security engineering team at Dropbox, and help manage our open source programmes.

Note that we aren't doing ``.format()`` or ``%``, but passing the fill text as the second parameter to ``.execute()`` — this is the correct way to protect against SQLi using MySQLdb.

I actually mistakenly thought this was SQLi when I was reviewing this code for release. Unfortunately, the MySQLdb documentation doesn't make that obvious.

See http://stackoverflow.com/a/7929438


This is very interesting. I worked on a similar project, but somewhat different. It's a Slack bot that monitors your Slack channels for indicators (IPs, URLs, files, etc.) and alerts you to possible threats, such as phishing attacks. Your Slack channel is as good an attack vector as anything else.

https://github.com/swimlane/makobot


Ideally you can practice immutable infrastructure and avoid running any ad-hoc commands on non-dev systems. Especially administrative ones using sudo. Takes a bit of a culture shift though if people aren't used to working that way.


Because I love replacing an elastic search cluster when changing a single parameter.

Immutable infrastructure is great for stateless micro services, everything else not so much.


Ideally you implement a middle ground of declarative (but not necessarily immutable) infrastructure where changes are diffed. Terraform does this pretty nicely.


I hear what you're saying, but we've got elastic search in Terraform as a module, and you dare not make mods to an existing cluster; Terraform will dutifully tear that cluster down depending on the changes you make (I mean, sure, use a "plan" first, but still).


Yea, unfortunately Terraform often insists on a full teardown when it would be possible to make an incremental update.


Agree, Terraform is awesome and we love it (https://blog.elasticbyte.net/getting-started-with-terraform-...). Howerver sometimes changes that should patch, instead result in destroying and re-creating instances which can be scary.


Quit using terraform as a complete monolith and modularize it.


See the title "getting started..."


To get around HN's hug of death taking out the dropbox blog:

http://archive.is/NqfmG


Email is pretty good for this and it's easier to backup and it's easier to BCC multiple addresses hosted on separate servers.


Why is accidentally invoking nmap and/or any port scan generating logs that humans were looking through?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: