On the Informativeness of Security Commit Messages: A Large-scale Replication Study
Syful Islam, Stefano Zacchiroli
TLDR
This replication study confirms security commit messages are generally uninformative, worsening over time, and even less so with Conventional Commits.
Key contributions
- Replicated a prior study on security commit message informativeness with independent data/methods.
- Confirmed original finding: security-related commit messages are generally uninformative.
- Showed informativeness is worsening over time and varies significantly across ecosystems.
- Found Conventional Commits are surprisingly less informative than non-compliant messages.
Why it matters
This paper highlights a critical issue in software security: uninformative commit messages hinder rapid patch deployment. Its findings underscore the urgent need for better, universally applicable guidelines to improve security communication across diverse software ecosystems.
Original Abstract
The informativeness of security-related commit messages is crucial for patch triage: when high, it enables the rapid distribution and deployment of security fixes. Prior research (Reis et al., 2023) reported, however, that commit messages are often too uninformative to support these activities. To assess the robustness of this negative result, we independently replicate the original study using only the information provided in the paper, without reusing any of the original artifacts (data, analysis pipeline, etc.). We retrieve \num{50673} security-related commits and analyze their informativeness using an independent re-implementation of the techniques introduced by Reis et al. For the same source (i.e., GitHub) and time period (from June 1999 to August 2022) as the original study, our replication confirms the original findings in a statistically significant way: security-related commit messages are, in general, not informative enough for security-focused purposes. We then extend the original study in several ways. Over a longer time period (from June 1999 to October 2025), we find that commit-message informativeness is worsening. Breaking results down by software ecosystem (Linux kernel, Ubuntu, Go, PyPI, etc.), we observe significant differences in informativeness. Finally, we examine emerging best practices for writing commit messages, such as the Conventional Commits Specification (CCS), and again find significant differences in an unexpected direction: CCS-compliant commits are less informative than non-compliant ones. Our findings highlight the need for cross-ecosystem analyses to understand platform- and community-specific commit-message practices, and to inform the development and adoption of universally applicable guidelines for writing informative security-related commit messages.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.