Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improvement of OpenSSF Scorecard Score #35730

Closed
4 tasks
harshitasao opened this issue Aug 16, 2024 · 7 comments
Closed
4 tasks

Improvement of OpenSSF Scorecard Score #35730

harshitasao opened this issue Aug 16, 2024 · 7 comments
Labels
area/security enhancement Feature requests. Not bugs or questions. stale stalebot believes this issue/PR has not been touched recently

Comments

@harshitasao
Copy link

harshitasao commented Aug 16, 2024

Title: Improvement of OpenSSF Scorecard Score

Description:
Hi, I'm Harshita. I’m working with CNCF and the Google Open Source Security Team for the GSoC 2024 term. We are collaborating to enhance security practices across various CNCF projects. The goal is to improve security for all CNCF projects by both using OpenSSF Scorecards and implementing its security improvements.

As this project already has scorecard action, I'm here to increase the final score by going over each check. I've listed all of the checks where work needs to be done, in order of its criticality. I plan to submit each PR for each fix. Please let me know what you think and for which ones a PR is welcome that I will submit it ASAP.

Current Score: 8.4

Scorecard report: https://scorecard.dev/viewer/?uri=github.com/envoyproxy/envoy

Here's a few checks we can work on to improve the project's security posture:

/cc @joycebrum @diogoteles08 @pnacht @nate-double-u

@harshitasao harshitasao added enhancement Feature requests. Not bugs or questions. triage Issue requires triage labels Aug 16, 2024
@adisuissa adisuissa added area/security and removed triage Issue requires triage labels Aug 16, 2024
@adisuissa
Copy link
Contributor

cc @envoyproxy/senior-maintainers @envoyproxy/security-team

@phlax
Copy link
Member

phlax commented Aug 16, 2024

cc @mmorel-35

@phlax
Copy link
Member

phlax commented Aug 16, 2024

re branch protection - i think we probably dont want to enforce 2 reviewers, or to enforce codeowner review if a maintainer has reviewed

re binaries - none of these are trivial to remove (afaiaa) or they would have been removed already

re signed releases - we do sign our releases using pgp, perhaps we can add the provenance stuff also

re pinned deps - all are pinned (afaiaa) other than the CI actions we develop ourselves - the reason these are not is that it has historically caused issues with dependabot

@ggreenway
Copy link
Contributor

I think @phlax has covered this pretty well. I'm not sure there's anything we actually want to change here, except possibly the signed release provenance.

I think in particular the score you arrived at on pinned deps is incorrect, as all code dependencies are pinned already.

@phlax
Copy link
Member

phlax commented Aug 17, 2024

the OSSF score is checked on every push - there is a badge on the repo README showing it

image

@mmorel-35 added the necessary to make this work some time ago and we got the score above 9 at that time

since then i reverted the pins for the toolshed github actions as it was causing some issues - this dropped our score significantly

you can check the found issues here https://github.com/envoyproxy/envoy/security/code-scanning

Copy link

This issue has been automatically marked as stale because it has not had activity in the last 30 days. It will be closed in the next 7 days unless it is tagged "help wanted" or "no stalebot" or other activity occurs. Thank you for your contributions.

@github-actions github-actions bot added the stale stalebot believes this issue/PR has not been touched recently label Sep 16, 2024
Copy link

This issue has been automatically closed because it has not had activity in the last 37 days. If this issue is still valid, please ping a maintainer and ask them to label it as "help wanted" or "no stalebot". Thank you for your contributions.

@github-actions github-actions bot closed this as not planned Won't fix, can't repro, duplicate, stale Sep 24, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/security enhancement Feature requests. Not bugs or questions. stale stalebot believes this issue/PR has not been touched recently
Projects
None yet
Development

No branches or pull requests

4 participants