You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi, I'm Harshita. I’m working with CNCF and the Google Open Source Security Team for the GSoC 2024 term. We are collaborating to enhance security practices across various CNCF projects. The goal is to improve security for all CNCF projects by both using OpenSSF Scorecards and implementing its security improvements.
Solution Description
As this project already has scorecard action, I'm here to increase the final score by going over each check. I've listed all of the checks where work needs to be done, in order of its criticality. I plan to submit each PR for each fix. Please let me know what you think and for which ones a PR is welcome that I will submit it ASAP.
The issue here is that this workflow doesn’t have a top-level read-only permissions block like present in the other workflows. Scorecard is quite severe in this check: a single workflow without top-level permissions gets a 0/10 for the check.
In my opinion, adding the following checks would be useful:
1. Require at least 2 reviewers for approval before merging.
2. Require review from code owners.
Or using GH rulesets as these are public and Scorecard will check for these as well.
realshuting
added
dependencies
Pull requests that update a dependency file
and removed
triage
Default label assigned to all new issues indicating label curation is needed to fully organize.
labels
Aug 26, 2024
Hi @harshitasao - thanks for taking the time to review and help improve Kyverno!
I can help with branch-protection - currently we require at least one reviewer for approval given the limited availability across all reviewers. I can require review from code owners, would this be enough?
Problem Statement
Hi, I'm Harshita. I’m working with CNCF and the Google Open Source Security Team for the GSoC 2024 term. We are collaborating to enhance security practices across various CNCF projects. The goal is to improve security for all CNCF projects by both using OpenSSF Scorecards and implementing its security improvements.
Solution Description
As this project already has scorecard action, I'm here to increase the final score by going over each check. I've listed all of the checks where work needs to be done, in order of its criticality. I plan to submit each PR for each fix. Please let me know what you think and for which ones a PR is welcome that I will submit it ASAP.
Current Score: 8.0
Scorecard report: https://scorecard.dev/viewer/?uri=github.com/kyverno/kyverno
Here's a few checks we can work on to improve the project's security posture:
Token-Permissions: Score = 0
Branch-Protection: Score = 5
In my opinion, adding the following checks would be useful:
1. Require at least 2 reviewers for approval before merging.
2. Require review from code owners.
Or using GH rulesets as these are public and Scorecard will check for these as well.
NOTE: This can only be done by the maintainers.
Signed-Releases: Score = 8
Pinned-Dependencies: Score = 9
/cc @joycebrum @diogoteles08 @pnacht @nate-double-u
Alternatives
N/A
Additional Context
reference: #2617
Slack discussion
None
Research
The text was updated successfully, but these errors were encountered: