-
-
Notifications
You must be signed in to change notification settings - Fork 1k
build: add Scorecards workflow #2098
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Kusari Analysis Results:
Combined security analysis shows no genuine security issues. Dependency analysis found no problematic dependency changes, code issues, or exposed secrets. Code analysis identified one false positive - a GitHub Action commit hash used for version pinning, which is actually a security best practice to prevent supply chain attacks. No vulnerabilities, workflow issues, or module security concerns were detected across both analyses. The PR is safe to merge. Note View full detailed analysis result for more information on the output and the checks that were run.
Found this helpful? Give it a 👍 or 👎 reaction! |
jamietanna
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Before this is merged, we need to move over to Branch Rulesets (https://github.com/ossf/scorecard-action?tab=readme-ov-file#authentication-with-fine-grained-pat-optional)
This is another step towards better understanding this project's health, and making it clear to consumers. Although we're already onboarded via the upstream project[0] (via the "old" repo name), it's better to have this a first-class product of our project, as this also allows validating i.e. branch protection due to `permissions: read-all`. Takes configuration via Renovate's usage[1], alongside the suggested version from the Scorecard project. This uploads the SARIF results to show that we have issues in the Security tab (for maintainers). [0]: https://securityscorecards.dev/viewer/?uri=github.com%2Fdeepmap%2Foapi-codegen [1]: https://github.com/renovatebot/renovate/blob/8b86b8cdb4a3e36d6211e47a2e6a201f25f674da/.github/workflows/scorecard.yml
380b6d4 to
25a6d54
Compare
|
Kusari PR Analysis rerun based on - 25a6d54 performed at: 2025-09-24T19:33:26Z - link to updated analysis |
This is another step towards better understanding this project's health,
and making it clear to consumers.
Although we're already onboarded via the upstream project0 (via the
"old" repo name), it's better to have this a first-class product of our
project, as this also allows validating i.e. branch protection due to
permissions: read-all.Takes configuration via Renovate's usage1, alongside the suggested
version from the Scorecard project.
This uploads the SARIF results to show that we have issues in the
Security tab (for maintainers).