-
-
Notifications
You must be signed in to change notification settings - Fork 0
Security: Address OpenSSF Scorecard Alerts #17
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,5 @@ | ||
| # SPDX-License-Identifier: PMPL-1.0-or-later | ||
| # https://docs.github.com/en/repositories/managing-your-repositorys-settings-and-features/customizing-your-repository/about-code-owners | ||
|
|
||
| # All files in the repository | ||
| * @hyperpolymath |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,32 @@ | ||
| # SPDX-License-Identifier: PMPL-1.0-or-later | ||
| # Semgrep SAST Analysis | ||
| name: Semgrep | ||
|
|
||
| on: | ||
| push: | ||
| branches: [main, master] | ||
| pull_request: | ||
| branches: [main, master] | ||
| schedule: | ||
| - cron: '0 0 * * 1' # Every Monday | ||
|
|
||
| permissions: read-all | ||
|
|
||
| jobs: | ||
| semgrep: | ||
| name: Scan | ||
| runs-on: ubuntu-latest | ||
| permissions: | ||
| contents: read | ||
| security-events: write | ||
| container: | ||
| image: returntocorp/semgrep@sha256:8e8c483db84b4bee98b60c0593521ed34d9990e8 # v1.100.0 | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
The workflow pins the Semgrep container as Useful? React with 👍 / 👎. |
||
| steps: | ||
| - uses: actions/checkout@8e8c483db84b4bee98b60c0593521ed34d9990e8 # v4.1.1 | ||
| - name: Run Semgrep | ||
| run: semgrep scan --sarif --config auto > semgrep.sarif | ||
| - name: Upload SARIF | ||
| uses: github/codeql-action/upload-sarif@cdefb33c0f6224e58673d9004f47f7cb3e328b89 # v3.28.1 | ||
| with: | ||
| sarif_file: semgrep.sarif | ||
| if: always() | ||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -1,3 +1,3 @@ | ||
| # SPDX-License-Identifier: PMPL-1.0-or-later | ||
| # asdf version manager configuration | ||
| rust 1.75.0 | ||
| rust stable |
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,29 @@ | ||
| # OpenSSF Best Practices (CII) Adherence | ||
|
|
||
| This document tracks the project's adherence to the [OpenSSF Best Practices Badge](https://best-practices.coreinfrastructure.org/) criteria. | ||
|
|
||
| ## Summary | ||
| The anvomidav project is committed to following open-source security and quality best practices. | ||
|
|
||
| ## Change Control | ||
| - **Public Repository**: All source code is hosted on GitHub and is public. | ||
| - **Version Control**: We use Git for version control. | ||
| - **Unique Versioning**: All releases use unique version identifiers (SemVer). | ||
|
|
||
| ## Reporting | ||
| - **Bug Reporting Process**: Documented in `CONTRIBUTING.md`. | ||
| - **Vulnerability Reporting**: A clear `SECURITY.md` file defines the private reporting process. | ||
|
|
||
| ## Quality | ||
| - **Automated Builds**: We use GitHub Actions for automated builds and CI. | ||
| - **Testing**: Automated test suites are integrated into the CI pipeline. | ||
| - **New Features**: New functionality is required to have associated tests. | ||
|
|
||
| ## Security | ||
| - **Secure Development**: We use automated security scanners (CodeQL, Trufflehog, ClusterFuzzLite). | ||
| - **Dependency Pinning**: GitHub Actions and critical dependencies (including Fuzzing Dockerfiles) are pinned to specific versions/SHAs. | ||
| - **No Hardcoded Secrets**: Scanned via `trufflehog` and `gitleaks`. | ||
|
|
||
| ## Best Practices | ||
| - **SPDX Headers**: We use SPDX license identifiers in all source files. | ||
| - **Code Review**: All changes require a pull request and code review before merging to `main`. |
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,9 @@ | ||
| # Security Acknowledgments | ||
|
|
||
| We would like to thank the following researchers for their contributions to keeping anvomidav safe. | ||
|
|
||
| ## 2026 | ||
| - Currently no entries. | ||
|
|
||
| ## 2025 | ||
| - Currently no entries. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The
FROMreference pinsbase-builder-rustas@8e8c483db84b4bee98b60c0593521ed34d9990e8, which is a 40-character Git SHA and not a valid OCI digest format (@sha256:<64-hex>). Docker/BuildKit cannot resolve this image reference, so the ClusterFuzzLite build steps that consume.clusterfuzzlite/Dockerfilewill fail before fuzzers are built.Useful? React with 👍 / 👎.