Periodic Reporting for period 2 - PROWEB (Protecting modern open-source web applications)
Okres sprawozdawczy: 2023-06-01 do 2024-11-30
We have created a semi-automated process to identify and process new security vulnerabilities in software components with code repository analysis and with our crowdsourced vulnerability intelligence platform. Our vulnerability intelligence automation has made Patchstack one of the largest software security vulnerability processors in the world with the highest number of CVE’s assigned in both 2023 and 2024 (source: https://cve.icu/CVE2023.html(odnośnik otworzy się w nowym oknie)). For example, 4566 new unique security vulnerabilities have been reported and fixed through our system in 2024 alone.
Another significant achievement has been the completion of our new novel virtual patching engine which allows us to generate vulnerability specific protection rules significantly faster thanks to the use of pre-made templates and simplified syntax. The new system allows us to automatically deploy vulnerability specific protection (auto-mitigation) rules to applications and precisely target the existing security vulnerabilities present. This has significantly speed up the mitigation efforts to eliminate security vulnerabilities to block any hacking attempts. The new engine allows to dynamically load and off-load virtual patches based on which vulnerabilities are present – making it less demanding for server performance and because only the protection rules that are really needed get loaded – the false positive rates are near zero. As of writing this post, we have created a collection of 9566 unique virtual patches which is the largest collection of vulnerability specific protection rules in the world.
Everything above has been seamlessly connected into our SaaS platform which we’ve been testing with beta testers and turned into a developer tool which is both easy to use and flexible enough to be easily accessible to anyone building or managing websites built with content management systems such as WordPress, WooCommerce, Drupal and Joomla.
The significant data generated from vulnerability intelligence automation and from our collection of virtual patches has also created a unique opportunity to shift our SAST vulnerability scanner into an “AI security researcher” which we’ve made significant progress with and have already been able to identify first real-world vulnerabilities in a fully automated manner.
We’ve been invited as partner and speaker to the largest WordPress conferences such as WordCamp EU, WordCamp US and other open-source ecosystem conferences such as OSdays, Fosdem, Cloudfest and many others.
In July 2024, Google took an interest in Patchstack and invited us to their exclusive Cybersecurity & AI startup program. This got us access to a whole network of Google engineers, their cloud resources and was a significant accelerator to our AI SAST project development.
In the end of 2024, we also opened our vulnerability intelligence automation platform for open-source vendors to help them become compliant with the new EU Cyber Resilience Act. This has become very successful and over 600 open-source developers have already set up their vulnerability disclosure programs with Patchstack.