-
Notifications
You must be signed in to change notification settings - Fork 469
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add OpenSSF scorecard #1706
Comments
Looking forward to it. We have something that sounds similar, also from IBM, called CBOM, so I'd suggest you target the same directory with your PR. |
Experimented (I've used it before on other projects) with this in a fork - the results aren't valid as such, but I'll create a PR See docs at https://github.com/ossf/scorecard Adding a default
We end up with an action that should publish it's findings to the 'security' tab For example my fork reports the following. Note that quite a few of these findings are DUE to running it on a fork (ie without branch protections etc) so not representative of what we'll find: Some are relevant, and we'll see actions recommended ie: Analysis, and remediation/filtering of the findings is a second pass. Note that to view security->code scanning alerts requires 'write' access on the repository - I'd be happy to help handle the results, but would need access. |
Thanks for the initial information.
Can you please explain why the results must be posted with write permissions? Wouldn't it be sensible --particularly at the start-- to have possible findings reported in the CI run logs only & then work through them and resolve them (before posting initial, un-vetted results causing unnecessary "alarm-ism")? Next would be adding them to the weekly CT tests and when we're sure this delivers reliable and actionable results we should add to repo-writing automatic public reporting... Plausible chain of events? |
Thanks for the comments in PR #27 - I've rebased, to refresh the results. Currently these are only found in the sarif file attached to the action. The scan is currently reporting
Would you be ok with this direction @baentsch ? I would be inclined to do the pinning in one PR, and the permissions change in a different one just to separate the concerns. In terms of the openssf PR itself, this could be rerun in draft once the above are merged. |
All sounds very plausible, @planetf1. Thanks for the explanations & looking forward to the PRs. |
I've updated the PR, and also included the changes for pinning versions within the PR (so that I can build together)
I used https://github.com/mheap/pin-github-action to update the github workflows to include the SHA. ie
This can then be used to pin the SHAs using
or a wildcard can be used for the files. This of course should be a development activity rather than CI, since the intent here is to ensure that it is under control of the dev process.
For our 'copy_from_upstream' script we use python. A requirements.txt file defines dependencies, and has the same issue reported by ossf scorecard - we need to pin There's a useful package at https://pypi.org/project/hashin/ which can be used to help this migration
This resulted in the somewhat verbose requirements.txt with full hash specs. Both of these tools are MIT licensed, and I'm thinking it's worth adding pointers/docs somewhere in the liboqs docs? This would apply to all the repos - any tips on where ? |
Signed-off-by: Nigel Jones <[email protected]>
…rements Signed-off-by: Nigel Jones <[email protected]>
Signed-off-by: Nigel Jones <[email protected]>
Signed-off-by: Nigel Jones <[email protected]>
Signed-off-by: Nigel Jones <[email protected]>
Signed-off-by: Nigel Jones <[email protected]>
Signed-off-by: Nigel Jones <[email protected]>
…rements Signed-off-by: Nigel Jones <[email protected]>
Signed-off-by: Nigel Jones <[email protected]>
Signed-off-by: Nigel Jones <[email protected]>
Signed-off-by: Nigel Jones <[email protected]>
Signed-off-by: Nigel Jones <[email protected]>
…rements Signed-off-by: Nigel Jones <[email protected]>
Signed-off-by: Nigel Jones <[email protected]>
Signed-off-by: Nigel Jones <[email protected]>
Signed-off-by: Nigel Jones <[email protected]>
Signed-off-by: Nigel Jones <[email protected]>
… action permissions open-quantum-safe#1706 Signed-off-by: Nigel Jones <[email protected]>
I suggest we generate OpenSSF Scorecards
We are offering assets in the security space. In addition to assurance of those assets in algorithmic terms & testing, there are additional criteria relating to the management of the project in github, packaging, dependencies, workflows, contributor diversity, and use of various tools.
scorecards are becoming more discussed as we all worry about supply-chain security, and some organizations are using them as criteria as to which projects can be used.
The tests can be done automatically in a github action to at least generate a local report - can consider later how to share further.
I think by doing this we add credibility (including in being more closely aligned to openssf) - even though initially we will likely fail on multiple criteria, but it gives us a best-practice list to work to.
Note - See also pq-code-package/tsc#14, but since we have code out there with open-quantum-safe, how about adding it here? If useful, we can consider extending it to other relevant repos - oqs-provider comes to mind, perhaps others/all. I'd be happy to propose a PR/take this on, and it should have very little risk/impact
The text was updated successfully, but these errors were encountered: