-
Notifications
You must be signed in to change notification settings - Fork 962
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Feature] Improvement of OpenSSF Scorecard Score #10908
Comments
Thanks for opening your first issue here! Be sure to follow the issue template! |
Hi @harshitasao - thanks for taking the time to review and help improve Kyverno! I can help with branch-protection - currently we require at least one reviewer for approval given the limited availability across all reviewers. I can require review from code owners, would this be enough? |
Hi, @harshitasao. I'm Dosu, and I'm helping the kyverno team manage their backlog. I'm marking this issue as stale. Issue Summary:
Next Steps:
Thank you for your understanding and contribution! |
Problem Statement
Hi, I'm Harshita. I’m working with CNCF and the Google Open Source Security Team for the GSoC 2024 term. We are collaborating to enhance security practices across various CNCF projects. The goal is to improve security for all CNCF projects by both using OpenSSF Scorecards and implementing its security improvements.
Solution Description
As this project already has scorecard action, I'm here to increase the final score by going over each check. I've listed all of the checks where work needs to be done, in order of its criticality. I plan to submit each PR for each fix. Please let me know what you think and for which ones a PR is welcome that I will submit it ASAP.
Current Score: 8.0
Scorecard report: https://scorecard.dev/viewer/?uri=github.com/kyverno/kyverno
Here's a few checks we can work on to improve the project's security posture:
Token-Permissions: Score = 0
Branch-Protection: Score = 5
In my opinion, adding the following checks would be useful:
1. Require at least 2 reviewers for approval before merging.
2. Require review from code owners.
Or using GH rulesets as these are public and Scorecard will check for these as well.
NOTE: This can only be done by the maintainers.
Signed-Releases: Score = 8
Pinned-Dependencies: Score = 9
/cc @joycebrum @diogoteles08 @pnacht @nate-double-u
Alternatives
N/A
Additional Context
reference: #2617
Slack discussion
None
Research
The text was updated successfully, but these errors were encountered: