Search

Items tagged with: curl


#curl



we keep ftp support in #curl for readline 😁
#curl


#curl


I think this is slightly better. Shows better how many really old #curl vulnerabilities we have had reported. Age of the flaw in number of the years on the y-axis, proper date of the report on the x-axis.
#curl


I've polished the graph that shows #curl vulnerability age when they were fixed. With median and average ages added.
#curl


#curl


1.Download curl.se using #curl built to use OpenSSL (that is over HTTPS in case Mastodon hides the scheme for you)
2. count number of allocations made with heaptrack
3. pause for gasping
4. double-check that curl only does 134 allocs itself, independently of the downloaded size
5. check the heaptrack number again

54,000

hm

#curl


I posted "writing C for #curl" just a short while ago, which is relevant to the recent "C mistake" graphs.

daniel.haxx.se/blog/2025/04/07…

#curl


You can follow along with the stream of security reports submitted to #curl by watching the ones we make public:

hackerone.com/curl/hacktivity

Per project policy, we make ALL reports public. (For practical reasons we have so far focused on getting everything submitted during 2025 disclosed. Hackerone has no method to disclose in bulk or automated, so it is a highly manual and tedious process involving a lot of clicks per single report)

#curl


C mistakes among the vulnerabilities present in #curl code

(C mistakes are vulnerabilities that were caused by a mistake that "probably would not have been possible" had we not been using C for curl. Manually assessed for each case.)

#curl


Number of graphs in the #curl dashboard - as a graph.
#curl


Vulnerability distribution present in #curl code

For every moment in time, how many vulnerabilities of different severity were present in code. We know now because these vulnerabilities have been reported and fixed since then.

The peak is at 7.41.0 on 2015-02-25 with 85 vulnerabilities present!

#curl


Working on a new graph.

Total severity distribution in #curl vulnerability reports

#curl


I'm introducing limits per test case in #curl test suite to make sure we don't unintentionally accidentally suddenly use many more allocations or much more concurrent memory than we can allow.

github.com/curl/curl/pull/1782…

#curl


#curl


Does #curl have a graph of how often the team is offered pancakes?
#curl


#curl


Another glimpse from the #curl user survey 2025

users score our security handling performance high

#curl


#curl user survey 2025 respondents like Mastodon:
#curl



that's in particular important to keep in mind when looking at a graph like this, showing the number of known vulnerabilities per 1,000 lines of code in #curl over time:
#curl


One of my fav graphs of #curl improvement in recent years, is the one showing vulnerabilities reported separated between low/medium and high/critical.

The report frequency has gone up, but they are less critical these days.

#curl


#curl survey 2025 respondents are not fans of #GitHub, but also not terribly against it...

(piece of the full analysis that I'm working on)


#curl


#curl



#curl


#curl


Today I added the following paragraph to #curl's hackerone page informing about our bug-bounty program:

Reports are made public

All security reports that are submitted to the curl project are subject for disclosure once they have been dealt with and they are deemed "insensitive". We are an Open Source project for which transparency is important, which then includes showing the world all our security reports as well.

(See hackerone.com/curl )

#curl


#curl



#curl