GSoC 2026: Security Audit and Hardening of the OpenELIS Laboratory Information System

Name: Brian Patrick Bahati

Email: bahatibrianp@gmail.com

GitHub/Portfolio: Bahati308 (Brian308) ยท GitHub

LinkedInhttps://www.linkedin.com/in/brian-patrick-bahati/

Synopsis / Abstract

As a system handling sensitive health information, ensuring the security and integrity of OpenELIS is critical. This project aims to perform a comprehensive security audit, identifying vulnerabilities, risks, and potential attack surfaces, and recommending fixes or implementing safeguards where feasible.

The goal is to provide OpenELIS with a robust security baseline, enhancing trust, compliance with data protection standards, and long-term maintainability.

Benefits to the Community

  1. Stronger Security Posture: Identify and mitigate vulnerabilities to protect patient and laboratory data.

  2. Community Awareness: Provide the OpenELIS community with a detailed security report and best practices for secure deployment.

  3. Compliance: Align OpenELIS with global healthcare security standards (e.g., HIPAA, GDPR compliance considerations).

  4. Open-Source Security Contribution: Set an example of secure software practices in open-source healthcare projects.

Deliverables / Expected Results

By the end of this project, the following will be delivered:

  1. Security Audit Report

    • Threat modeling and attack surface analysis

    • Vulnerability scanning results (OWASP Top 10, dependency vulnerabilities, etc.)

    • Recommendations for mitigation and secure coding practices

  2. Test Cases & Automation Scripts

    • Scripts for automated security checks (static analysis, dependency checks, and CI/CD integration)
  3. Optional Fixes

    • Patches or pull requests addressing high-risk vulnerabilities identified during the audit
  4. Documentation

    • Guidelines for secure deployment and coding standards for OpenELIS contributors

Technical Details / Implementation Plan

Phase 1 โ€“ Initial Assessment (Weeks 1โ€“2)

  • Understand OpenELIS Global architecture and components

  • Map out potential threat vectors

  • Review existing security documentation

Phase 2 โ€“ Vulnerability Scanning (Weeks 3โ€“4)

  • Perform static and dynamic code analysis

  • Analyze dependencies for known vulnerabilities

  • Test for common security risks (SQL injection, XSS, CSRF, insecure file handling)

Phase 3 โ€“ Risk Analysis & Prioritization (Weeks 5โ€“6)

  • Categorize vulnerabilities by severity

  • Identify immediate, medium-term, and long-term security actions

Phase 4 โ€“ Mitigation and Patching (Weeks 7โ€“10)

  • Implement fixes or suggest remediations

  • Develop automated CI/CD checks for security issues

Phase 5 โ€“ Reporting and Documentation (Weeks 11โ€“12)

  • Compile final security report with findings, mitigations, and recommendations

  • Provide documentation for contributors to maintain secure practices

Requirements / Skills Needed

  • Strong understanding of web application security and secure coding practices

  • Familiarity with OWASP Top 10 and security best practices for web-based software

  • Experience with Python, Java, or related languages used in OpenELIS

  • Knowledge of CI/CD, automated testing, and static analysis tools

  • Basic understanding of healthcare compliance and data privacy standards

Why I Am a Good Fit

  • Certified in Ethical Hacking, Cybersecurity, and Networking

  • Experienced in auditing and securing open-source codebases

  • Strong background in web applications, DevOps practices, and automated testing

  • Passionate about contributing to healthcare IT projects and improving open-source software

  • Participated in GSoC 2025 where I improved the E2E QA Tests with OpenELIS

References / Resources

Future Work

  • Continuous security monitoring integration into OpenELIS CI/CD pipeline

  • Regular security audits and automated patching of dependencies

  • Education for community contributors on secure coding practices

Any idea on this project is very welcome and will be glad to hear it.

cc: @caseyi , @Moses_Mutesasira

1 Like

Hi, Iโ€™m Anuj Mishra, a beginner contributor interested in GSoC 2026.
This proposal is really insightful.
I wanted to ask if there are smaller security-related tasks or beginner-friendly issues where I can start contributing and gradually learn about security auditing in OpenELIS.