Some checks failed
api-governance / spectral-lint (push) Has been cancelled
Docs CI / lint-and-preview (push) Has been cancelled
oas-ci / oas-validate (push) Has been cancelled
SDK Publish & Sign / sdk-publish (push) Has been cancelled
Policy Lint & Smoke / policy-lint (push) Has been cancelled
Policy Simulation / policy-simulate (push) Has been cancelled
devportal-offline / build-offline (push) Has been cancelled
4.5 KiB
4.5 KiB
Determinism Benchmark (cross-scanner) — Stable (2025-11)
Source: advisory “23-Nov-2025 - Benchmarking Determinism in Vulnerability Scoring”. This doc captures the runnable harness pattern and expected outputs for task BENCH-DETERMINISM-401-057.
Goal
- Measure determinism rate, order-invariance, and CVSS delta σ across scanners when fed identical SBOM+VEX inputs with frozen feeds.
Minimal harness (Python excerpt)
# run_bench.py (excerpt) — deterministic JSON hashing
def canon(obj):
return json.dumps(obj, sort_keys=True, separators=(',', ':')).encode()
def shas(b):
return hashlib.sha256(b).hexdigest()
for sbom, vex in zip(SBOMS, VEXES):
for scanner, tmpl in SCANNERS.items():
for mode in ("canonical", "shuffled"):
for i in range(10):
if mode == "shuffled":
sb, vx = shuffle(sbom), shuffle(vex)
out = run(tmpl.format(sbom=sb, vex=vx))
norm = normalize(out) # purl, vuln id, base_cvss, effective
blob = canon({"scanner": scanner, "sbom": sbom,
"vex": vex, "findings": norm})
results.append({
"hash": shas(blob), "mode": mode,
"run": i, "scanner": scanner, "sbom": sbom
})
Inputs
- 3–5 SBOMs (CycloneDX 1.6 / SPDX 3.0.1) + matching VEX docs covering affected/not_affected/fixed.
- Feeds bundle: vendor DBs (NVD, GHSA, OVAL) hashed and frozen.
- Policy: single normalization profile (e.g., prefer vendor scores, CVSS v3.1).
- Reachability dataset (optional combined run):
tests/reachability/samples-publiccorpus; graphs produced viastella graph liftfor each language sample; runtime traces optional.
Metrics
- Determinism rate = identical_hash_runs / total_runs (20 per scanner/SBOM).
- Order-invariance failures (# distinct hashes between canonical vs shuffled).
- CVSS delta σ vs reference; VEX stability (σ_after ≤ σ_before).
Deliverables
bench/determinism/with harness, hashed inputs, andresults.csv.bench/determinism/inputs.sha256listing SBOM, VEX, feed bundle hashes (deterministic ordering).bench/reachability/dataset.sha256listing reachability corpus inputs (graphs, runtime traces) when running combined bench.- CI target
bench:determinismproducing determinism% and σ per scanner; optionalbench:reachabilityto recompute graph hash and runtime hit stability.
Links
- Source advisory:
docs/product-advisories/23-Nov-2025 - Benchmarking Determinism in Vulnerability Scoring.md - Sprint task: BENCH-DETERMINISM-401-057 (SPRINT_0401_0001_0001_reachability_evidence_chain.md)
How to run (local)
cd bench/determinism
python3 -m venv .venv && source .venv/bin/activate
pip install -r requirements.txt
# Freeze feeds and policy hashes
./freeze_feeds.sh ../feeds/bundle.tar.gz > inputs.sha256
# Run determinism bench
python run_bench.py --sboms inputs/sboms/*.json --vex inputs/vex/*.json \
--scanners configs/scanners.yaml --runs 20 --shuffle
# Reachability dataset (optional)
python run_reachability.py --graphs ../reachability/graphs/*.json \
--runtime ../reachability/runtime/*.ndjson.gz --output results-reach.csv
Outputs are written to results.csv (determinism) and results-reach.csv (reachability stability) plus SHA manifests.
How to run (CI)
- Target
bench:determinismin CI (see.gitea/workflows/bench-determinism.yml) runs the harness with frozen feeds and uploadsresults.csv+inputs.sha256as artifacts. - Optional
bench:reachabilitytarget replays reachability corpus, recomputes graph hashes, and compares against expecteddataset.sha256. - CI must fail if determinism rate < 0.95 or any graph hash mismatch.
Offline/air-gap workflow
- Place feeds bundle, SBOMs, VEX, and reachability corpus under
offline/inputs/with matchinginputs.sha256anddataset.sha256. - Run
./offline_run.sh --inputs offline/inputs --outputs offline/resultsto execute both benches without network. - Verify hashes:
sha256sum -c offline/inputs/inputs.sha256andsha256sum -c offline/inputs/dataset.sha256. - Store outputs plus manifests in Offline Kit; include DSSE envelope if signing is enabled (
./sign_results.sh).
Notes
- Keep file ordering deterministic (lexicographic) when generating manifests.
- Do not pull live feeds during bench runs; use frozen bundles only.
- For reachability runs, require symbol manifest availability; otherwise mark missing symbols and fail the run.