Summary
Hardening the binary against exploit vectors and providing transparency into the software supply chain.
Work
- Control Flow Integrity (CFI): Ensure that function pointers in the poller cannot be hijacked.
- Link-Time Optimization (LTO): Enable LTO in the CI for cross-file inlining and improved static analysis.
- Automated SBOM (CycloneDX/SPDX): Generate a Software Bill of Materials in the GHA pipeline to instantly track vulnerable versions of OpenSSL or MySQL.
- Hermetic/Static Bundling: Link libmysqlclient and libnetsnmp statically for easier, conflict-free enterprise distribution.
Estimated Effort: 32–50 man-hours.
Acceptance Criteria
Summary
Hardening the binary against exploit vectors and providing transparency into the software supply chain.
Work
Estimated Effort: 32–50 man-hours.
Acceptance Criteria