Contents VS lunasec

Compare Contents vs lunasec and see what are their differences.

Contents

Community documentation, code, links to third-party resources, ... See the issues and pull requests for pending content. Contributions are welcome ! (by Qubes-Community)

lunasec

LunaSec - Dependency Security Scanner that automatically notifies you about vulnerabilities like Log4Shell or node-ipc in your Pull Requests and Builds. Protect yourself in 30 seconds with the LunaTrace GitHub App: https://github.com/marketplace/lunatrace-by-lunasec/ (by lunasec-io)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
Contents lunasec
85 36
253 1,406
-0.4% 0.6%
6.3 5.5
6 months ago 3 months ago
Shell TypeScript
- GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

Contents

Posts with mentions or reviews of Contents. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-07-11.
  • QubesOS – A reasonably secure operating system
    3 projects | news.ycombinator.com | 11 Jul 2023
    I've been using Qubes for the past 2 years while going to school, and I found it really fun and helpful. A lot of professors had me download random closed source software from random websites during the pandemic, and it was easier to download it to a VM than to convince them about Free Software. More than that though it's been really helpful just for my own workflow. I can hit a keybind and start working from essentially a fresh linux install. It's easier to stay on task when each VM is designed to only do one kind of task. It's also nice having debian, fedora, windows, kali, and whonix all easily accessible on the same machine.

    The main sticking point for me is that Qubes is reasonably secure from _myself_. I make mistakes. I first started using linux with an Ubuntu install that I broke a year later because I accidentally added in a space when typing `rm -rf ~/Arduino` which made it `rm -rf ~ /Arduino`. On Qubes I can `sudo rm -rf /` on the VM I'm using right now and not break a sweat. I have a keybind to spawn a disposable "airgapped" VM to deal with sensitive or untrusted data, and it helps knowing that even if I mess up with whatever I'm doing, the VM will keep everything reasonably contained.

    Some cool things that Qubes has outside of just VMs are its features enabled by the communication between VMs. Notable ones are Split GPG (https://www.qubes-os.org/doc/split-gpg/) which let you use a VM as if it were a smartcard for GPG and Split SSH (https://github.com/Qubes-Community/Contents/blob/master/docs...) which let you isolate your private SSH keys from your VM running your SSH client.

    There are some sticking points around Qubes. For instance, I use Tailscale to connect my computers to each other from anywhere. Tailscale's install scripts add their keys to my VM's package manager for updates and installs. The proper way to do this in Qubes is to clone a TemplateVM, run Tailscale's install script, update, install, and then base an AppVM off of it. But that creates an entire new OS taking up storage and requiring updates. You can hack a way around this in an AppVM which saves a considerable amount of space, but it takes a lot of upfront time to do and requires you to manually update it.

    Another sticking point is hardware acceleration. The desktop environment has access to hardware acceleration, so it runs fine, but opening videos in AppVMs is all software decoded. I'm on a Thinkpad T580 and it can run 1080p videos, but the fans turn on and can't do 4K. When I want to game or do something GPU heavy I either stream from my tower or completely switch over.

    Overall, I'm really happy with Qubes and I'm planning to stick with it on my laptops.

  • Installing Windows 10 as a Qube. The install crashes at 10% in the "Getting files ready for installation" stage
    1 project | /r/Qubes | 20 Jun 2023
  • GPU passthrough on Qubes?
    1 project | /r/Qubes | 24 May 2023
    I can't speak to 17+ GPUs - but have successfully passed through a single high-end GPU for gaming via following these instructions: https://github.com/Qubes-Community/Contents/blob/master/docs/customization/gaming-hvm.md
  • Qubes OS new templates?
    1 project | /r/Qubes | 12 May 2023
  • Installer crashes at last moment ?
    1 project | /r/Qubes | 22 Mar 2023
  • Dual-booting Qubes and a Debian distro?
    1 project | /r/Qubes | 13 Mar 2023
  • ArchQubes?
    1 project | /r/Qubes | 1 Mar 2023
  • Windows 7, 10, or 11 vm in Qubes-Os
    1 project | /r/Qubes | 12 Feb 2023
    Yes its possible. But check here under "Audio Support", also says at the bottom that windows 7, 10 & 11 are fully supported. As for how to install Windows, here. And installing Windows 11 by disabling the TPM check: https://forum.qubes-os.org/t/windows-11-in-qubes/6759/8.
  • ISO download for HVM failing on all VMs
    1 project | /r/Qubes | 1 Feb 2023
  • VPN Killswitch?
    1 project | /r/Qubes | 28 Jan 2023
    Follow this guide https://github.com/Qubes-Community/Contents/blob/master/docs/configuration/vpn.md

lunasec

Posts with mentions or reviews of lunasec. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-01-27.
  • Guys, I taught ChatGPT to browse the internet and it is bloody amazing.
    1 project | /r/geek | 13 Mar 2023
  • Ask HN: Those making $0/month or less on side projects – Show and tell
    95 projects | news.ycombinator.com | 27 Jan 2023
    LunaTrace: https://lunatrace.lunasec.io/

    Premise: Open Source[0] alternative to GitHub Dependabot and `npm audit` that focuses on helping you prioritize where to patching first (only 0.1% of CVEs are used in cyber attacks).

    Short YouTube demo: https://www.youtube.com/watch?v=ugdSyR2L6sY

    A newer video showing off the whole Static Analysis engine: https://www.youtube.com/watch?v=vPd4MSUJ98M

    Price: $0 for Open Source repos. We're hoping to charge for private repos in the future, but we need to build out the billing features first lol. (We're at $0 in revenue currently.)

    If you are filled with rage because of CVEs spamming you, come vent your frustrations on Discord: https://discord.gg/2EbHdAR5w7

    We're looking for early customers that are interested in working with us. My email is on my profile. Cheers!

    [0]: Source Code, https://github.com/lunasec-io/lunasec/

  • Log4Shell Still Has Sting in the Tail
    4 projects | news.ycombinator.com | 30 Dec 2022
    (Note: I'm the person that coined the term "Log4Shell")

    You may be surprised when I tell you what the Apache Software foundations yearly budget is. You'd think for software that is used by practically every Fortune 500 company and most governments, it would be something reasonable. Maybe a few hundred million dollars a year to pay for a reasonable full-time staff, right?

    It turns out... it's about $2 million a year. (Wikipedia[0])

    This helps explain to me why the devs of Log4j directly uploaded the file "JNDIExploit.java" (the POC) to GitHub while they were patching. (Here is a full analysis and guide about how to prevent that[1].)

    They're not security people. They're volunteers working on this in addition to their full-time job.

    What kind of brave soul wants to trudge through and maintain log4j in their spare time for zero compensation? I appreciate the people that are capable of doing that, but I think they are rare!

    This whole entire vulnerability was eye opening for everybody and I have actually spent the last year building tooling on GitHub to help fix the problems that Log4Shell exposed.

    If you have 2 seconds to try that out or just Star the repo[2], it would be very helpful!

    0: Log4j revenue https://en.wikipedia.org/wiki/The_Apache_Software_Foundation

    1: "How to Discuss and Fix Vulnerabilities in Open Source" https://www.lunasec.io/docs/blog/how-to-mitigate-open-source...

    2: GitHub project building better dependency patching tools https://github.com/lunasec-io/lunasec

  • Malicious Python Packages Replace Crypto Addresses in Developer Clipboards
    1 project | /r/netsec | 7 Nov 2022
    If anybody is curious to replicate this type of analysis, we should connect because I've been working a project to build an engine for this type of analysis for about a year now. GitHub Repo
  • Dozens of malicious PyPI packages discovered targeting developers
    23 projects | news.ycombinator.com | 2 Nov 2022
    It is possible to set your registry in NPM via the "npmrc" file. That will let you hit the specified HTTP server whenever you run commands like "npm install".

    I know this is also possible for Python because we did it at Uber. I don't remember the specific details anymore though.

    In either case though, a lot of people have written proxies for this use case (I helped write one for NPM at Uber). Companies like Bytesafe and Artifactory also exist in this space.

    We're working on something similar that's on GitHub here: https://github.com/lunasec-io/lunasec

    Proxy support isn't built out yet but the data is all there already.

  • Preventing the bait and switch by open core software companies
    4 projects | news.ycombinator.com | 27 Oct 2022
    The current system is broken. I don't think I agree with everything in the post, but I'm excited to see movement in this space given that this is a space I spend a lot of time thinking about. (I'll expand on that below)

    Even if I disagree with parts of this, this is still one of the most interesting things that I've read around OSS licensing in a minute! Having actual VC money behind this movement is awesome.

    For context: I run an Open Source company that's YC + VC-backed. We use are using a hybrid of Apache and Business Source License (BSL, a "non-compete" license that converts to Apache in 2-3 years). Our license file[0] has context about my thought process around this, but I still am not totally happy with it. (BSL isn't an "OSI-Compatible", even if it does feel like the "best" license currently.)

    To come to that conclusion, I've read both Heather Meeker's book, "Open (Source) for Business"[1], multiple times now and I've also blogged about this topic[2] before.

    All of that is to say, it's complicated and there are some perverse incentives that can prevent you from always "doing the right thing".

    Problem #1: You lose control. You may begin with Apache but, as OP states, you eventually end up with the incentive to "rug pull" by switching the license because of market forces/VC influence. (I'm the founder of my company and I would resist it, but eventually our investors might control the board and make that happen anyway by replacing me.)

    Problem #2: The hardest part of building a company is getting traction. Just getting anybody to care about you takes a ton of effort and having a permissive license makes it way easier to get that early adoption. And, by the time you have adoption and you decide to go raise VC money, you now end up with Problem #1.

    Problem #3: If you start with a copyleft license like GPL/AGPL, then you make Problem #2 harder. Many companies simply won't adopt your software if you're using that. (Linux is a notable exception here, but even companies using AGPL like MongoDB have switched away from copyleft.)

    We are using BSL because it feels like the best compromise (it becomes Apache 2.0 eventually). I do still think a lot about switching to Apache though. I just really hate the idea of "rug pulling" and I'd rather be honest from the beginning with a license like BSL, even if it is more difficult to get that initial momentum.

    Does anybody else have thoughts to share about this?

    0: https://github.com/lunasec-io/lunasec/blob/master/LICENSE.md

    1: Open (Source) for Business: A Practical Guide to Open Source Software Licensing - Third Edition https://a.co/8SLjVZI

    2: https://www.lunasec.io/docs/blog/how-to-build-an-open-source...

  • Ignore 98% of dependency alerts: introducing Semgrep Supply Chain
    1 project | news.ycombinator.com | 4 Oct 2022
    Here is some code on GitHub that does call site checking using SemGrep: https://github.com/lunasec-io/lunasec/blob/master/lunatrace/...

    (Note: I helped write that. We're building a similar service to the r2c one.)

    You're right that patching is hard because of opaque package diffs. I've seen some tools coming out like Socket.dev which show a diff between versions. https://socket.dev/npm/package/react/versions

    But, that said, this is still a hard problem to solve and it's happened before that malware[0][1] has been silently shipped because of how opaque packages are.

    0: https://web.archive.org/web/20201221173112/https://github.co...

    1: https://www.coindesk.com/markets/2018/11/27/fake-developer-s...

  • Ask HN: How do you deploy your weekend project in 2022?
    3 projects | news.ycombinator.com | 9 Sep 2022
    https://github.com/lunasec-io/lunasec/blob/master/lunatrace/...

    It's more complicated now but if you look at the history of that "backend-cdk" folder then it's simpler a few months ago.

    The important bit is the "ecs-patterns" library. That's the one that is magical and deals with setting up the load balancer, cluster, etc for you. And the way we shove the Docker images in I found to be quite straightforward. (And deploys are one line)

  • Cdk8s: CNCF-Backed Infrastructure-as-Code (IaC) for Kubernetes
    2 projects | news.ycombinator.com | 6 Sep 2022
    I saw this last night while trying to setup Flux on EKS. I wanted to share this and see what other tools people are using too.

    Is it possible for Kubernetes to be startup-friendly? (We're using ECS right now via the normal CDK[0]).

    0: https://github.com/lunasec-io/lunasec/blob/master/lunatrace/...

  • Vulnerability Management for Go
    4 projects | news.ycombinator.com | 6 Sep 2022
    This is really cool to see because this is the #1 problem with current tools (as you said). I call it "alert fatigue" in my head because it's meaningless when you have 100+ vulns to fix but they're 99% unexploitable.

    I have a bit of a bone to pick with this space: I've been working on this problem for a few months now (link to repo[0] and blog[1]).

    My background is Application Security and, as is often the case with devs, rage fuels me in my desire to fix this space. Log4Shell helped too.

    As another comment said, doing this in a language agnostic way is a big PITA and we haven't fully built it yet. We are using SemGrep to do very basic ststic analysis (see if vulnerable function is ever imported + called). But we're not doing fancy Inter-process taint analysis like CodeQL can.

    (We have a big Merkle tree that represents the dependency tree and that's how we are able to make the CI/CD check take only a few seconds because we can pre-compute.)

    Anyway, if you have a second to help, we have a GitHub App[1] that you can install to test this out + help us find bugs. It's best at NPM now but we have basic support for other languages (no dep te analysis yet).

    There are so many edge cases with the ways that repos are setup so just have more scans coming in helps a ton. (Well, it breaks stuff, but we already determined that rage sustains me.)

    Thank you. climbs off of soap box

    0: https://github.com/lunasec-io/lunasec

    1: https://www.lunasec.io/docs/blog/the-issue-with-vuln-scanner...

    2: https://github.com/marketplace/lunatrace-by-lunasec

What are some alternatives?

When comparing Contents and lunasec you can also consider the following projects:

Qubes-vpn-support - VPN configuration in Qubes OS

immudb - immudb - immutable database based on zero trust, SQL/Key-Value/Document model, tamperproof, data change history

proton-bridge - Proton Mail Bridge application

apache-log4j-poc - Apache Log4j 远程代码执行

qubes-app-split-browser - Tor Browser (or Firefox) in a Qubes OS disposable, with persistent bookmarks and login credentials

wazuh-dashboard-plugins - Plugins for Wazuh Dashboard

bitmap-fonts - Monospaced bitmap fonts for X11, good for terminal use.

react-payment-inputs - A React Hook & Container to help with payment card input fields.

qubes-windows-tools-cross - Qubes Windows Tools build with mingw, wine and qubes-builder

log4shell-tools - Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046

qubes-issues - The Qubes OS Project issue tracker

mantine - A fully featured React components library