Skip to content

Maintainer spotlight: Managing dependencies and the Metasploit pen testing toolkit

Keeping open source software secure is a community responsibility. But with millions of projects, it’s hard to pinpoint the right signal from noise—and find and fix the vulnerabilities that really…

Maintainer spotlight: Managing dependencies and the Metasploit pen testing toolkit

Keeping open source software secure is a community responsibility. But with millions of projects, it’s hard to pinpoint the right signal from noise—and find and fix the vulnerabilities that really matter. Over the next few weeks, we’re sharing stories from open source maintainers on what it takes to secure the world’s software. Second up: a Q&A with Metasploit Framework

An official maintainer of the Metasploit Framework, Spencer McIntyre works for a US-based technology company doing offensive security-oriented research and development. Previously at a consulting firm where he dealt with clients from multiple industries—including healthcare, energy, and manufacturing—Spencer is an avid open source contributor and Python enthusiast.

What is Metasploit?

By number of exploit modules, the Metasploit Framework is the largest open source penetration testing toolkit. It enables security professionals to test for the presence of vulnerabilities, demonstrate their impact, and validate security controls within their environment. The project has been under development for over 15 years now and has seen contributions from over 800 users since joining the GitHub platform in 2011.

How will the Metasploit project improve my life?

Penetration testers around the world use the Metasploit Framework to demonstrate attacker capabilities and recommend security improvements to their clients. Internal security teams at many Fortune 500 companies, as well as government agencies, use it to test and secure their infrastructure. While the Metasploit Framework targets a specific set of users—pen testers—developers still benefit from its use indirectly, by improving the security of their projects.

What are some of the day-to-day security struggles that maintainers face? 

Just like any other software project, one of the largest security issues the Metasploit Framework faces is dealing with external dependencies. Any software project is going to have its share of security vulnerabilities, so we need to be able to monitor for those affecting our dependency tree and determine whether or not they impact our project.

Within the Metasploit Framework specifically, one of the unique challenges that we face is the need for our “payloads” to operate within highly constrained environments. To demonstrate that a vulnerability is present, and to show the risk of exploiting it, we often end up running a piece of software on the remote system that is a part of our framework. Because it might run in a variety of environments, this software can’t rely on the presence of any third-party libraries or even modern operating system environments. This often requires us to put in a lot of effort into maintaining compatibility, and security features are no exception to that.

Metasploit makes it easier to find and fix your application’s vulnerabilities, specifically exploitable ones. Why is this important, and how does Metasploit help the developer community? 

The Metasploit Framework gives users and organizations of all sizes free and open access to attacker capabilities and enables them to test and demonstrate vulnerabilities. This helps organizations to better understand which vulnerabilities are exploitable within their environment, and thus focus their remediation efforts where they’ll have the highest impact. For developers specifically, there’s a growing trend in using complex infrastructure as part of the software development lifecycle (SDLC). The Metasploit Framework can be used as part of a CI/CD pipeline to test for common security vulnerabilities as part of existing development infrastructure, allowing developers to more confidently ensure the integrity of their projects.

What advice would you give developers on how to best improve the security of their open source projects?

Make reasonable efforts to limit the number of dependencies and select the ones that are used carefully. Follow best practices like performing periodic security checks and reviewing the configuration of any bundled components.

What do you do to keep your code more secure? 

We recently started using Snyk which sends us a report periodically to help us be aware of issues that may be affecting our codebase. We also use GitHub’s integration with GPG to sign our merge commits, allowing us to attribute a contribution to a specific developer with write access.

How do you ensure the dependencies in your project are secure?

We regularly update the majority of our dependencies using some automation tools. In addition to that, we use Snyk to monitor our dependencies.

Are there any additional best practices you have in place?

We peer review code contributions and also use extensive automated testing to catch potential issues. In addition to unit tests in Travis CI, we use Jenkins to run some usage checks. With the recent announcement that we’re developing version 6 of the Metasploit Framework, we’ve taken strides in key locations to attempt to be “secure by default” in our development pipeline. So far, that’s manifested as changes to encrypt traffic by default where possible.

Want to learn more about open source security? Read about:

Check back in soon—we’ll be diving into open source security projects and sharing security best practices from open source maintainers over the next few weeks.

Explore more from GitHub



See what’s happening in the open source community.
GitHub Universe 2024

GitHub Universe 2024

Get tickets to the 10th anniversary of our global developer event on AI, DevEx, and security.
GitHub Copilot

GitHub Copilot

Don't fly solo. Try 30 days for free.
Work at GitHub!

Work at GitHub!

Check out our current job openings.