Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improvement of OpenSSF Scorecard Score #4943

Closed
2 of 3 tasks
harshitasao opened this issue Aug 22, 2024 · 3 comments
Closed
2 of 3 tasks

Improvement of OpenSSF Scorecard Score #4943

harshitasao opened this issue Aug 22, 2024 · 3 comments
Labels
area/ci CI related issues and pull requests

Comments

@harshitasao
Copy link
Contributor

harshitasao commented Aug 22, 2024

Hi, I'm Harshita. I’m working with CNCF and the Google Open Source Security Team for the GSoC 2024 term. We are collaborating to enhance security practices across various CNCF projects. The goal is to improve security for all CNCF projects by both using OpenSSF Scorecards and implementing its security improvements.

As this project already has scorecard action, I'm here to increase the final score by going over each check. I've listed all of the checks where work needs to be done, in order of its criticality. I plan to submit each PR for each fix. Please let me know what you think and for which ones a PR is welcome that I will submit it ASAP.

Current Score: 8.6
Improved Score: 8.8

Scorecard report: https://scorecard.dev/viewer/?uri=github.com/fluxcd/flux2

Here's a few checks we can work on to improve the project's security posture:

/cc @joycebrum @diogoteles08 @pnacht @nate-double-u

@stefanprodan
Copy link
Member

stefanprodan commented Aug 22, 2024

The backport workflow can only be triggered with a custom label add by maintainers on PRs, this workflow does not run by default, so a malicious PR would not be able to read any GHA secrets. Can we exclude this workflow from the scorecard scanner?

@harshitasao
Copy link
Contributor Author

The backport workflow can only be triggered with a custom label add by maintainers on PRs, this workflow does not run by default, so a malicious PR would not be able to read any GHA secrets. Can we exclude this workflow from the scorecard scanner?

I don't think we can exclude a workflow from the scorecard scanner.

@harshitasao
Copy link
Contributor Author

Closing this issue as all the task are done!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/ci CI related issues and pull requests
Projects
None yet
Development

No branches or pull requests

2 participants