Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Create SECURITY.md #464

Merged

Conversation

Willmish
Copy link
Collaborator

Pull Request

Issue Number: #415

Summary

Adds security.md file, explaining the security policy for the project.

Checklist

  • Local Tests Passing?
  • CICD and Pipeline Tests Passing?
  • Added any new Tests?
  • Documentation Updates Made?
  • Are there any API Changes? If yes, please describe below.
  • This is not a breaking change. If it is, please describe it below.

Are there API Changes?

N/A

Is this a breaking change?

No

Please follow
GitHub's suggested syntax
to link Pull Requests to Issues via keywords

This PR Closes #415

@Willmish
Copy link
Collaborator Author

Also - we can consider adding an alternative security reporting method (built in gh feature):

for a repo: https://docs.github.com/en/code-security/security-advisories/working-with-repository-security-advisories/configuring-private-vulnerability-reporting-for-a-repository
for an organisation: https://docs.github.com/en/code-security/security-advisories/working-with-repository-security-advisories/configuring-private-vulnerability-reporting-for-an-organization

example project using this feature: https://github.com/electron/electron/blob/main/SECURITY.md

I would suggest this does not replace the method for contact via an email address, but be an alternative

@Willmish Willmish requested a review from danuw February 12, 2024 17:28
@Sophietn
Copy link
Contributor

Hey @Willmish
The issue description 'applicable criteria for the Open SSF Best Practice Badge' is needed for the Graduation acceptance criteria
Can we add in how we are doing against that badge criteria?
I think this is the link
https://www.bestpractices.dev/en/criteria

@Willmish Willmish added Ready for Review PR Ready for review with the GSF team for merge 1.3 Tracking the work towards release 1.3 labels Feb 12, 2024
@Willmish
Copy link
Collaborator Author

Willmish commented Feb 12, 2024

@Sophietn sure, took a while but added a review of it all, with notes that potentially need addressing at the end, please review @vaughanknight .

According to these criteria, the project deifnitely falls under "Passing" (covering all the points which the project MUST follow)

Basics:

basic proj website content

FLOSS license

Documentation

Other

Change control

Public VCS repo

Unique versioning numbering

Release notes

Reporting

Bug reporting process

Vulnerability report process

  • have a vulnerability report process - ✅ Added in this PR: Create SECURITY.md #464
  • Private vulnerability if supported must include info how to send - ✅ N/A (allowed) - no private vulnerability reporting set up but proposed
  • initial response time for vulnerability submitted in last 6 months must be <= 14 days - ✅ N/A (allowed) - project run by volunteers, does not provide response time guarantee as stated in SECURITY.md (this pr)

Quality

Working build system

Automated test suite

New functionaility testing

Warning flags

Security

Secure development knowledge

  • at least one primary developer who knows how to design secure software - ✅ @vaughanknight is at least one of them :)
  • at least one of the project's primary developers MUST know of common kinds of errors that lead to vulnerabilities in this kind of software, as well as at least one method to counter or mitigate each of them - ✅ @vaughanknight is at least one of them :)

Use basic good cryptographic practices

Secured delivery against man-in-the-middle (MITM) attacks

  • delivery mechanisms that counters MITM - ✅ uses HTTPS
  • cyrptographic hash NOT retrived over HTTP - ✅ ues HTTPS

Publicly known vulnerabilities fixed

  • no unpatched vulnerabilities of medium or higher severity that have been publicly known for more than 60 day - ✅ no such vulnerabilities

Other security issues

  • public repo doesnt leak private credential - ✅ does not do that

Analysis

Static code analysis

Dynamic code analysis

  • All medium and higher severity exploitable vulnerabilities discovered with dynamic code analysis MUST be fixed in a timely way after they are confirmed. - ✅ N/A (allowed, no DYnamic code analysis in place).

@Willmish notes:

confirmed medium vulnerabilities exist but not addressed as location sharing of carbon emissions is one of the main purposes of CA SDK, code needs to be annotated to ignore this: #415 (comment)

@Willmish Willmish requested a review from Sophietn February 12, 2024 18:37
Copy link
Collaborator

@danuw danuw left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

approved

@danuw danuw merged commit db78f30 into Green-Software-Foundation:dev Feb 13, 2024
8 checks passed
@Willmish Willmish deleted the Willmish-patch-securitymd branch February 13, 2024 10:58
@Sophietn
Copy link
Contributor

Hey @Willmish - thanks so much for checking us against the criteria for the Open SSF Best Practice Badge. Great we're passing! This review of yours will get lost if it only remains on this PR. Can we copy it onto the security.md please?

@danuw danuw mentioned this pull request Feb 26, 2024
4 tasks
@danuw danuw removed the Ready for Review PR Ready for review with the GSF team for merge label Mar 5, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
1.3 Tracking the work towards release 1.3
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Update documentation of secureness (security.md)
3 participants