Skip to content

How do you identify a safe proxy for a critical system? #18

@aingealbear

Description

@aingealbear

You would need to know that the system is similar in its control. Therefore, the controlling software should be analyzed. It's easy to argue that you could just find a twin for your critical system in an academic sense. But in the real world, you may not have access to the intellectual property or trade secrets of the controlling software without giving something up; payment for access, ownership or your product, etc. Even black box testing might require an expensive license to operate the proxy.

Could you identify a potential proxy without access to its source code? There may be over one billion Git repositories in the world today, between GitHub and other Git services. Could you determine software similarity based on Git metadata such as commit messages, commit counts, churn, and other data? GitLogger can help you identify similar software systems to as potential safe test proxies for critical system.

Metadata

Metadata

Assignees

Labels

DraftFuture Content to be Published

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions