Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improvement of OpenSSF Scorecard Score #5391

Open
1 of 5 tasks
harshitasao opened this issue Aug 16, 2024 · 0 comments
Open
1 of 5 tasks

Improvement of OpenSSF Scorecard Score #5391

harshitasao opened this issue Aug 16, 2024 · 0 comments

Comments

@harshitasao
Copy link

harshitasao commented Aug 16, 2024

Hi, I'm Harshita. I’m working with CNCF and the Google Open Source Security Team for the GSoC 2024 term. We are collaborating to enhance security practices across various CNCF projects. The goal is to improve security for all CNCF projects by both using OpenSSF Scorecards and implementing its security improvements.

After the opening of the scorecard action addition PR, I'm here to increase the final score by going over each check. I've listed all of the checks where work needs to be done, in order of its criticality. I plan to submit each PR for each fix. Please let me know what you think and for which ones a PR is welcome that I will submit it ASAP.

Current Score: 6.9

Scorecard report: https://scorecard.dev/viewer/?uri=github.com/karmada-io/karmada

Here's a few checks we can work on to improve the project's security posture [ in order of its criticality ]:

  • Signed-Releases: Score = 0

    • The releases need to be signed; we can use cosign using github actions for that, and it will increase the score to 8. Additionally, SLSA provenance also needs to be added, which can be done using this, increasing the overall score to 10.
  • Vulnerabilities: Score = 9

    • After running the osv scanner locally, a significant amount of vulnerabilities were found that need to be fixed.
    • May need to add an osv-scanner.toml to mark some of these as not impacting/ignored.
    • Open vulnerabilities are easily exploited by attackers and should be fixed as soon as possible.
  • Fuzzing: Score = 0

    • Integrating the project with OSS-Fuzz by following the instructions here. The most difficult one on the list, maintainers help, is highly appreciated. For example, helping in identifying the components where fuzz testing will be added.
    • Issue: Add fuzz-testing #5451
  • SAST: Score = 0

    • Running the CodeQL checks in the CI/CD by following the instructions here.
  • Pinned-Dependencies: Score = 0

    • Github actions and go commands are not pinned by hash, which is resulting in a low score. But pinning go commands would introduce the risk of running outdated versions.
    • Pinning dependencies to a specific hash rather than allowing mutable versions or ranges of versions improves supply chain security.
    • PR: fix: fixed the pinned dependencies issue #5396

/cc @joycebrum @diogoteles08 @pnacht @nate-double-u

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant