Hi Alex, Thanks for the rapid feedback. Before anything else I should say that we loved Clojure before using it at work, and we're even more in love now we are using it at work - a huge thankyou to the core team and Rich, and a great community.
Yes - I did see your previous comment but as was a long time back and I had a broader context seemed useful to use a new post. I understand your point - making changes to avoid false positives is frustrating at best. At this point in time we are analysing to first see to what extent we can 'fix' these, and then what the picture looks like once they are 'fixed' (given that on top of these issues there will obviously be both false and real positives (presumably) in our own codebase (currently just a small prototype system); so if we find any real issues we will definitely feed back to you thanks. I think that we will anyway report back to you our findings on the core false positives - I understand you may not pick them up but seems a good source of info. Wrt the context - you are right there are several banks using Clojure - I have reached out a bit to get advice or experience, but so far not been able to find anyone who has had to do this and been successful. I think a key factor is that many banks operate (not without justification) quite different policies wrt their own home-build projects and services and products which they license from third party vendors; so I suspect that the majority of use is for in house work - e.g. Capital One, Nubank. Anyhow I agree this isn't an issue for everyone - ironically and very frustratingly we are convinced that Clojure is actually facilitating security over e.g. Java in many many ways. For us the real challenge is to find a cost effective (fairly) objective scalable means of evidencing to our customers that the product has a robust security design: we are smallish and have a large customer base of large customers. Sorry to bother you with various questions around this - but wondering if you may have the experience or contacts to highlight some alternative avenue: - We are currently using HP Fortify which is not a bad product, but there are others such as Veracode. To my knowledge they are all broadly similar and none of them are currently providing anything Clojure friendly - but would you know of something more Clojure friendly? - Our current approach is based around this route of using known objective analysis - for all its shortcomings (it is painful enough in Java). We are just now pondering to what extent we could solidly demonstrate on a more 'hammock based' approach i.e. list out long list of vulnerability categories and cite the design and implementation approaches which mitigate or prevent. This is in itself useful and an extension of what we anyway do - but customer wise it is obviously not really 'objective'. A way to make it more strongly objective would be to use a third party - that may however be costly. - Similarly we are wondering to what extent we could expand the work we do in terms of ethical hacking / penetration testing - perhaps we could raise the bar there in terms of automation. Thanks a gain for your time. -- You received this message because you are subscribed to the Google Groups "Clojure" group. To post to this group, send email to clojure@googlegroups.com Note that posts from new members are moderated - please be patient with your first post. To unsubscribe from this group, send email to clojure+unsubscr...@googlegroups.com For more options, visit this group at http://groups.google.com/group/clojure?hl=en --- You received this message because you are subscribed to the Google Groups "Clojure" group. To unsubscribe from this group and stop receiving emails from it, send an email to clojure+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.