‹ Reports
The Dispatch

OSS Report: wazuh/wazuh


Wazuh Project Sees Active Development with Focus on Enhancements and Bug Fixes

Wazuh, an open-source security platform providing XDR and SIEM capabilities, is actively addressing vulnerabilities and enhancing features in preparation for its 4.10.0 release candidate.

Recent Activity

Recent issues and pull requests (PRs) indicate a strong focus on addressing Python 3.8 end-of-life concerns (#26530) and Azure integration bugs (#26523). The development team is actively working on improving the vulnerability detection module and refining integration tests.

Team Members and Recent Activities

  1. GGP1

    • 91 commits: Command management, error handling, unit tests.
  2. Miguel Angel Cazajous (MiguelazoDS)

    • 31 commits: CI/CD workflows, artifact uploads, tool delivery fixes.
  3. Julián Morales (juliancnn)

    • 32 commits: Engine tools, documentation, CI workflows.
  4. Gabriel E. Valenzuela

    • 25 commits: Unit tests, indexer connector, vulnerability scanner.
  5. Sebastian Falcone (sebasfalcone)

    • 19 commits: CI workflows, engine Dockerfile, integration tests.
  6. Octavio Valle (Dwordcito)

    • 18 commits: CA handling, vulnerability scanner tools.
  7. Juan Cabrera Carabaza (JcabreraC)

    • 10 commits: Dockerfile updates, package generation.
  8. Nahuel Figueroa (NahuFigueroa97)

    • 7 commits: Efficacy tests for software packages.
  9. Damian Mangold (Damian-Mangold)

    • 7 commits: Vulnerability scanner fixes, documentation updates.
  10. Facundo Dalmau (fdalmaup)

    • 4 commits: API enhancements, integration tests.

Of Note

  1. Python Compatibility Concerns: Urgent focus on Python 3.8 end-of-life impacts (#26530).

  2. Azure Integration Issues: Persistent bugs affecting cloud security functionalities (#26523).

  3. Vulnerability Detection Enhancements: Prioritization of CISA data over NVD for improved accuracy (#26493).

  4. Architectural Improvements: Implementation of order distribution across server nodes for scalability (#26492).

  5. Testing Emphasis: Significant work on unit testing and CI/CD processes to ensure quality assurance.

The Wazuh project is actively evolving with a clear focus on addressing critical issues and enhancing its security capabilities through collaborative development efforts.

Quantified Reports

Quantify Issues



Recent GitHub Issues Activity

Timespan Opened Closed Comments Labeled Milestones
7 Days 130 49 352 21 1
14 Days 199 108 475 33 1
30 Days 345 185 849 58 1
All Time 17909 15499 - - -

Like all software activity quantification, these numbers are imperfect but sometimes useful. Comments, Labels, and Milestones refer to those issues opened in the timespan in question.

Quantify commits



Quantified Commit Activity Over 30 Days

Developer Avatar Branches PRs Commits Files Changes
Miguel Angel Cazajous 4 9/7/0 31 348 88707
Octavio Valle 3 4/3/0 18 121 16759
Julian Morales 2 10/8/0 32 173 15523
Jose Luis Carreras Marín (jotacarma90) 3 4/4/0 10 32 11028
GGP1 4 9/10/0 91 120 5498
Nahuel Figueroa 2 3/3/0 7 28 3739
Jeremiah Kolawole (jk-olaoluwa) 1 0/1/0 6 1 1301
GabrielEValenzuela 8 8/5/1 25 24 809
Zafer Balkan (zbalkan) 1 3/0/0 6 3 674
Sebastian Falcone 6 8/8/0 19 25 549
Matias Pereyra (pereyra-m) 3 5/5/0 4 13 389
Juan Cabrera Carabaza 7 13/12/1 10 32 290
Javier Bejar Mendez 2 7/7/0 8 25 290
Damian 4 6/5/0 6 10 206
Santiago David Vendramini (sdvendramini) 1 1/1/0 1 4 154
Ebuka John Onyejegbu 1 0/0/0 5 4 131
Federico Ramos (RamosFe) 2 2/0/0 4 8 95
Facundo Dalmau 3 4/2/0 4 9 87
Tomas Sarquis 1 3/6/0 1 3 86
Victor M. Fernandez-Castro 3 5/5/0 4 14 76
Matias Braida (matias-braida) 1 1/0/0 2 3 69
Damian Mangold 3 1/1/0 7 18 56
Marcel Kemp Muñoz 2 2/2/0 4 6 24
Manuel Cano (mjcr99) 1 1/1/0 2 3 9
Javier Sanchez Gil (javiersanchz) 2 2/3/0 2 3 8
Federico Rodriguez (asteriscos) 1 1/0/0 1 1 3
None (sdamm) 0 1/0/0 0 0 0
Josip Deanović (djosip) 0 0/1/0 0 0 0
Openime Oniagbi 0 0/0/0 0 0 0
Pavel Motyrev (legioner0) 0 1/0/0 0 0 0
Michael (mimugmail) 0 1/0/0 0 0 0
Lucho Donda (LucioDonda) 0 1/1/0 0 0 0
None (iasdeoupxe) 0 1/0/0 0 0 0
CloudAware (cloudgitaware) 0 1/0/0 0 0 0

PRs: created by that dev and opened/merged/closed-unmerged during the period

Detailed Reports

Report On: Fetch issues



Recent Activity Analysis

The Wazuh project has seen significant recent activity, with 2410 open issues and a notable influx of new issues, particularly around the vulnerabilities and enhancements related to the 4.10.0 release candidate. Key themes include critical updates regarding Python compatibility, enhancements to the vulnerability detection module, and ongoing integration tests for various components.

Several issues highlight urgent concerns, such as the impact of Python 3.8's end of life on cloud security modules (#26530) and persistent bugs in the Azure integration (#26523). A recurring theme is the need for improved documentation and clarity around configuration settings, particularly for new users navigating complex integrations.

Issue Details

Most Recently Created Issues

  1. Issue #26530: Measure Python 3.8 EOL impact

    • Priority: High
    • Status: Open
    • Created: 0 days ago
  2. Issue #26529: Migrate checkfiles from test_upgrade pipelines for each OS

    • Priority: Medium
    • Status: Open
    • Created: 0 days ago
  3. Issue #26528: Migrate checkfiles from test_upgrade pipelines for each OS

    • Priority: Medium
    • Status: Open
    • Created: 0 days ago
  4. Issue #26526: Snapshot issues

    • Priority: Medium
    • Status: Open
    • Created: 0 days ago
  5. Issue #26525: Link statically libgcc_s.so and libstdc++.so in the wazuh-engine

    • Priority: Medium
    • Status: Open
    • Created: 0 days ago

Most Recently Updated Issues

  1. Issue #26524: Decompress base vulnerability feed during the first start of wazuh-engine

    • Priority: Medium
    • Status: Open
    • Last Updated: 0 days ago
  2. Issue #26523: Wazuh Agent: Azure integration not working for 4.10.0 Alpha 2

    • Priority: High
    • Status: Open
    • Last Updated: 0 days ago
  3. Issue #26522: Vulnerability detection error out the box for macOS Sequoia 15.0 x86_64

    • Priority: High
    • Status: Open
    • Last Updated: 0 days ago
  4. Issue #26521: Bug found in the Wazuh installation assistant script for Wazuh indexer

    • Priority: Medium
    • Status: Open
    • Last Updated: 0 days ago
  5. Issue #26520: Epic: Engine - Updating and improving wazuh-engine APIs

    • Priority: Low
    • Status: Open
    • Last Updated: 0 days ago

Important Observations

  • The recent issues primarily focus on migration tasks, bug fixes, and enhancements related to the upcoming release.
  • There is a noticeable urgency surrounding Python version compatibility due to its end-of-life status.
  • Multiple issues are related to Azure integration failures, indicating potential systemic problems that could impact cloud security functionalities.
  • The documentation surrounding configuration settings and active responses appears to be a common pain point among users, suggesting a need for clearer guidance.

This analysis reveals critical areas requiring attention to ensure stability and user satisfaction as Wazuh continues to evolve with new features and integrations.

Report On: Fetch pull requests



Overview

The provided data includes a comprehensive list of pull requests (PRs) from the Wazuh project repository, covering various enhancements, bug fixes, and feature additions. The PRs reflect ongoing efforts to improve the Wazuh platform's functionality, security, and user experience.

Summary of Pull Requests

  1. PR #26531: Fix vulnerability scanner database paths

    • Status: Open
    • Significance: Addresses a critical issue with the vulnerability scanner's database paths, ensuring correct functionality.
    • Notable: Directly related to issue #26524, indicating active maintenance and responsiveness to identified problems.
  2. PR #26493: Vulnerability Scanner - Prioritize CISA vulnerability content over NVD

    • Status: Open
    • Significance: Enhances the vulnerability scanner by prioritizing more reliable CISA data over NVD, improving accuracy in vulnerability detection.
    • Notable: Implements fallback mechanisms to ensure comprehensive coverage despite potential gaps in CISA data.
  3. PR #26492: Implement wazuh-server orders distribution

    • Status: Open
    • Significance: Introduces a significant architectural change by implementing order distribution across Wazuh server nodes, enhancing scalability and efficiency.
    • Notable: Closes issue #25599, showcasing progress on previously identified enhancements.
  4. PR #26484: Remove published_date field from YARA template

    • Status: Open
    • Significance: Simplifies YARA integration by removing unnecessary fields that cause conflicts with existing installations.
    • Notable: Addresses issue #377 in the Wazuh dashboard repository, indicating cross-project coordination.
  5. PR #26479: Fix regular expressions for usernames

    • Status: Open
    • Significance: Corrects regex patterns to accurately validate usernames in Debian systems, preventing false negatives in compliance checks.
    • Notable: Directly addresses issues with specific CIS rules (33178, 3319, 33180), highlighting attention to detail in compliance auditing.
  6. PR #26472: Adds the engine-router tool

    • Status: Open
    • Significance: Introduces a new CLI tool for engine routing, simplifying command-line interactions with Wazuh engines.
    • Notable: Represents an effort to enhance usability and streamline operations within the Wazuh ecosystem.
  7. PR #26470: Add python unit tests coverage action to 4.10.0

    • Status: Open
    • Significance: Implements GitHub Actions for Python unit test coverage reporting in version 4.10.0, improving code quality assurance processes.
    • Notable: Addresses issue #26466, demonstrating commitment to maintaining high standards of code reliability.
  8. PR #26467: Router stateless events to the engine

    • Status: Open
    • Significance: Enhances event handling by routing stateless events directly to the engine, improving responsiveness and processing efficiency.
    • Notable: Closes issue #25620, indicating successful resolution of previously identified enhancements.
  9. PR #26463: Implemented valid UTF8 character checks

    • Status: Open
    • Significance: Fixes UTF-8 validation logic to correctly handle multibyte characters, preventing false negatives in file integrity monitoring.
    • Notable: Addresses issues (#25967) that could impact internationalization and localization efforts.
  10. PR #26453: Handle socket server exceptions

    • Status: Open
    • Significance: Improves robustness by handling exceptions during socket server operations, preventing crashes and enhancing stability.
    • Notable: Closes issue #26452, showcasing proactive measures to enhance system reliability.
  11. PR #26401: Update RBAC decorators to get information from the indexer

    • Status: Open
    • Significance: Updates role-based access control (RBAC) mechanisms to retrieve agent and group information from the indexer, improving security management.
    • Notable: Closes issue #26350, indicating progress on enhancing security features.
  12. PR #26398: Fix security Unit Test

    • Status: Open
    • Significance: Corrects outdated RBAC catalog entries used in unit tests, ensuring accurate testing of security features.
    • Notable: Addresses issue #26379, highlighting attention to maintaining accurate testing environments.
  13. Additional PRs (#26396, #26380) focus on improving testing frameworks and adding new tests for specific functionalities like Microsoft Exchange Server 2019 efficacy tests and router stateless events handling.

Analysis of Pull Requests

The analysis of these PRs reveals several key themes:

  • There is a strong focus on enhancing the functionality and reliability of the Wazuh platform through architectural improvements (e.g., order distribution across nodes) and feature enhancements (e.g., prioritizing CISA data).
  • The project demonstrates responsiveness to community feedback and identified issues through timely updates and fixes (e.g., fixing regex patterns for username validation).
  • There is an emphasis on improving usability and developer experience with new tools (e.g., engine-router) and enhanced testing frameworks (e.g., Python unit tests coverage action).
  • The project maintains a high standard of code quality and reliability through rigorous testing and continuous integration practices (e.g., handling socket server exceptions).

Overall, these PRs reflect a well-managed open-source project with active development efforts aimed at continuously improving its security capabilities, usability, and robustness in response to both user needs and evolving security challenges.

Report On: Fetch commits



Development Team and Recent Activity

Team Members and Recent Activities

1. Octavio Valle (Dwordcito)

  • Recent Commits: 18 commits
  • Activities:
    • Enhanced CA handling and fixed vulnerability scanner tools.
    • Merged multiple pull requests related to efficacy tests for Firefox and Dockerfile updates.
    • Collaborated with various team members on vulnerability scanner enhancements.

2. Sebastian Falcone (sebasfalcone)

  • Recent Commits: 19 commits
  • Activities:
    • Updated CI workflows, fixed triggers, and improved logging.
    • Worked on the engine's Dockerfile and integration tests.
    • Collaborated with Octavio on several enhancements.

3. Gabriel E. Valenzuela

  • Recent Commits: 25 commits
  • Activities:
    • Focused on unit tests, including adding cases for CA arrays and improving log messages.
    • Made significant contributions to the indexer connector and vulnerability scanner.

4. Damian Mangold (Damian-Mangold)

  • Recent Commits: 7 commits
  • Activities:
    • Primarily involved in fixing issues related to the vulnerability scanner and updating documentation.

5. Miguel Angel Cazajous (MiguelazoDS)

  • Recent Commits: 31 commits
  • Activities:
    • Worked extensively on CI/CD workflows, including artifact uploads and tool delivery fixes.
    • Collaborated with other members on efficacy tests and vulnerability scanning improvements.

6. Juan Cabrera Carabaza (JcabreraC)

  • Recent Commits: 10 commits
  • Activities:
    • Focused on Dockerfile updates and merging branches for package generation.

7. Facundo Dalmau (fdalmaup)

  • Recent Commits: 4 commits
  • Activities:
    • Contributed to API enhancements and integration tests.

8. GGP1

  • Recent Commits: 91 commits
  • Activities:
    • Significant contributions across various areas including command management, error handling, and unit tests.

9. Julián Morales (juliancnn)

  • Recent Commits: 32 commits
  • Activities:
    • Worked on engine tools, documentation, and CI workflows.

10. Nahuel Figueroa (NahuFigueroa97)

  • Recent Commits: 7 commits
  • Activities:
    • Focused on efficacy tests for various software packages.

Additional Contributors:

Other contributors like Victor M. Fernandez-Castro, Tomas Sarquis, Zafer Balkan, and others have also made notable contributions across different branches focusing on bug fixes, enhancements, and testing.

Patterns and Themes

  1. Collaboration: There is a strong collaborative effort among team members, especially between Octavio Valle and Sebastian Falcone, who frequently work together on enhancements and fixes.

  2. Focus Areas: Recent activities show a concentrated effort on improving CI/CD processes, enhancing testing frameworks, and addressing vulnerabilities in the software.

  3. Continuous Improvement: The team is actively engaged in refining existing features (e.g., vulnerability scanning) while also adding new functionalities (e.g., efficacy tests).

  4. High Volume of Changes: The number of commits indicates a high level of activity within the team, particularly from GGP1 and Miguel Angel Cazajous, suggesting they are key contributors to ongoing development efforts.

  5. Diverse Contributions: The involvement of multiple developers across various branches indicates a well-distributed workload with diverse focus areas ranging from bug fixes to feature enhancements.

  6. Testing Emphasis: A significant amount of recent work has been dedicated to unit testing and improving test coverage across various modules, reflecting a commitment to quality assurance.

Overall, the development team is actively engaged in enhancing the Wazuh platform through collaborative efforts focused on continuous improvement and robust testing practices.